LEADER 02976nam 2200613 a 450 001 9910485030003321 005 20200520144314.0 010 $a1-280-38778-5 010 $a9786613565709 010 $a3-642-14215-X 024 7 $a10.1007/978-3-642-14215-4 035 $a(CKB)2670000000028937 035 $a(SSID)ssj0000446416 035 $a(PQKBManifestationID)11285481 035 $a(PQKBTitleCode)TC0000446416 035 $a(PQKBWorkID)10497002 035 $a(PQKB)10096323 035 $a(DE-He213)978-3-642-14215-4 035 $a(MiAaPQ)EBC3065497 035 $a(PPN)149072902 035 $a(EXLCZ)992670000000028937 100 $a20100528d2010 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of intrusions and malware, and vulnerability assessment $e7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /$fChristian Kreibich, Marko Jahnke, (eds.) 205 $a1st ed. 210 $aBerlin $cSpringer$d2010 215 $a1 online resource (XII, 219 p. 55 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6201 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14214-1 320 $aIncludes bibliographical references and index. 327 $aHost Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis ? Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can?t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS ? Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks. 410 0$aLecture notes in computer science ;$v6201. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 606 $aIntrusion detection systems (Computer security)$vCongresses 606 $aMalware (Computer software)$vCongresses 615 0$aIntrusion detection systems (Computer security) 615 0$aMalware (Computer software) 676 $a005.8 701 $aKreibich$b Christian$01759271 701 $aJahnke$b Marko$01759272 712 12$aDIMVA 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485030003321 996 $aDetection of intrusions and malware, and vulnerability assessment$94197686 997 $aUNINA