LEADER 04619nam 22007455 450 001 996466107403316 005 20200629171452.0 010 $a3-540-70542-2 024 7 $a10.1007/978-3-540-70542-0 035 $a(CKB)1000000000490499 035 $a(SSID)ssj0000317180 035 $a(PQKBManifestationID)11231536 035 $a(PQKBTitleCode)TC0000317180 035 $a(PQKBWorkID)10288920 035 $a(PQKB)10728206 035 $a(DE-He213)978-3-540-70542-0 035 $a(MiAaPQ)EBC3068567 035 $a(PPN)127054901 035 $a(EXLCZ)991000000000490499 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment$b[electronic resource] $e5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings /$fedited by Diego Zamboni 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (X, 279 p.) 225 1 $aSecurity and Cryptology ;$v5137 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-70541-4 320 $aIncludes bibliographical references and index. 327 $aAttack Prevention -- Data Space Randomization -- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks -- VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense -- Embedded Malware Detection Using Markov n-Grams -- Learning and Classification of Malware Behavior -- Attack Techniques and Vulnerability Assessment -- On Race Vulnerabilities in Web Applications -- On the Limits of Information Flow Techniques for Malware Analysis and Containment -- Malware Detection and Prevention (II) -- Expanding Malware Defense by Securing Software Installations -- FluXOR: Detecting and Monitoring Fast-Flux Service Networks -- Traffic Aggregation for Malware Detection -- Intrusion Detection and Activity Correlation -- The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors -- The Quest for Multi-headed Worms -- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in Paris, France in July 2008. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on attack prevention, malware detection and prevention, attack techniques and vulnerability assessment, and intrusion detection and activity correlation. 410 0$aSecurity and Cryptology ;$v5137 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aZamboni$b Diego$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aDIMVA 2008 906 $aBOOK 912 $a996466107403316 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$9772293 997 $aUNISA