LEADER 04818nam 22008055 450 001 996465430203316 005 20200702012903.0 010 $a3-642-02918-3 024 7 $a10.1007/978-3-642-02918-9 035 $a(CKB)1000000000753966 035 $a(SSID)ssj0000317181 035 $a(PQKBManifestationID)11258598 035 $a(PQKBTitleCode)TC0000317181 035 $a(PQKBWorkID)10288768 035 $a(PQKB)11727019 035 $a(DE-He213)978-3-642-02918-9 035 $a(MiAaPQ)EBC3064359 035 $a(PPN)136307140 035 $a(EXLCZ)991000000000753966 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment$b[electronic resource] $e6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings /$fedited by Ulrich Flegel, Danilo Bruschi 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 225 p.) 225 1 $aSecurity and Cryptology ;$v5587 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02917-5 320 $aIncludes bibliographical references and index. 327 $aMalware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, emulation-based detection, software diversity, harnessing context, and anomaly detection. 410 0$aSecurity and Cryptology ;$v5587 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aComo (2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a004n/a 686 $aDAT 460f$2stub 686 $aSS 4800$2rvk 702 $aFlegel$b Ulrich$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBruschi$b Danilo$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aDIMVA 2009 906 $aBOOK 912 $a996465430203316 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$92071230 997 $aUNISA