DIMVA B

15 papers

YearTitle / Authors
2005A Learning-Based Approach to the Detection of SQL Attacks.
Fredrik Valeur, Darren Mutz, Giovanni Vigna
2005A Pointillist Approach for Comparing Honeypots.
Fabien Pouget, Thorsten Holz
2005A Prevention Model for Algorithmic Complexity Attacks.
Suraiya Khan, Issa Traoré
2005Analyzing Memory Accesses in Obfuscated x86 Executables.
Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia
2005Automatic Detection of Attacks on Cryptographic Protocols: A Case Study.
Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
2005Detecting Malicious Code by Model Checking.
Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
2005Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
Klaus Julisch, Christopher Krügel
2005Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
2005Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
2005Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone.
Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner
2005Hybrid Engine for Polymorphic Shellcode Detection.
Udo Payer, Peter Teufl, Mario Lamberger
2005Improving the Efficiency of Misuse Detection.
Michael Meier, Sebastian Schmerl, Hartmut König
2005METAL - A Tool for Extracting Attack Manifestations.
Ulf Larson, Emilie Lundin Barse, Erland Jonsson
2005Masquerade Detection via Customized Grammars.
Mario Latendresse
2005TCPtransform: Property-Oriented TCP Traffic Transformation.
Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson