LEADER 04281nam 22008175 450 001 9910484356103321 005 20251226203227.0 010 $a3-642-02918-3 024 7 $a10.1007/978-3-642-02918-9 035 $a(CKB)1000000000753966 035 $a(SSID)ssj0000317181 035 $a(PQKBManifestationID)11258598 035 $a(PQKBTitleCode)TC0000317181 035 $a(PQKBWorkID)10288768 035 $a(PQKB)11727019 035 $a(DE-He213)978-3-642-02918-9 035 $a(MiAaPQ)EBC3064359 035 $a(PPN)136307140 035 $a(EXLCZ)991000000000753966 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings /$fedited by Ulrich Flegel, Danilo Bruschi 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 225 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5587 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-02917-5 320 $aIncludes bibliographical references and index. 327 $aMalware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, emulation-based detection, software diversity, harnessing context, and anomaly detection. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5587 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aData protection 606 $aComputers and civilization 606 $aCryptology 606 $aIT Operations 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aData protection. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aComputers and Society. 676 $a004n/a 686 $aDAT 460f$2stub 686 $aSS 4800$2rvk 701 $aBruschi$b Danilo$0990035 701 $aFlegel$b Ulrich$01763067 712 12$aDIMVA 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484356103321 996 $aDetection of intrusions and malware, and vulnerability assessment$94203319 997 $aUNINA