000 03393nam a22005655i 4500
001 978-3-642-14215-4
003 DE-He213
005 20140220084541.0
007 cr nn 008mamaa
008 100702s2010 gw | s |||| 0|eng d
020 _a9783642142154
_9978-3-642-14215-4
024 7 _a10.1007/978-3-642-14215-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aKreibich, Christian.
_eeditor.
245 1 0 _aDetection of Intrusions and Malware, and Vulnerability Assessment
_h[electronic resource] :
_b7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings /
_cedited by Christian Kreibich, Marko Jahnke.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXII, 219p. 55 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6201
505 0 _aHost Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
520 _aThis book constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2010, held in Bonn, Germany, in July 2010.The 12 revised full papers presented together with two extended abstracts were carefully selected from 34 initial submissions. The papers are organized in topical sections on host security, trends, vulnerabilities, intrusion detection and web security.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aAlgorithm Analysis and Problem Complexity.
700 1 _aJahnke, Marko.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642142147
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6201
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14215-4
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112432
_d112432