DIMVA B

14 papers

YearTitle / Authors
2009A Case Study on Asprox Infection Dynamics.
Youngsang Shin, Steven A. Myers, Minaxi Gupta
2009A Service Dependency Modeling Framework for Policy-Based Response Enforcement.
Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka
2009Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter
2009Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks.
Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda
2009Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
Ulrich Flegel, Danilo Bruschi
2009How Good Are Malware Detectors at Remediating Infected Systems?.
Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni
2009Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract).
Christian Bockermann, Martin Apel, Michael Meier
2009On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Jin Han, Debin Gao, Robert H. Deng
2009Polymorphing Software by Randomizing Data Structure Layout.
Zhiqiang Lin, Ryan D. Riley, Dongyan Xu
2009Selecting and Improving System Call Models for Anomaly Detection.
Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero
2009Shepherding Loadable Kernel Modules through On-demand Emulation.
Chaoting Xuan, John A. Copeland, Raheem A. Beyah
2009Towards Proactive Spam Filtering (Extended Abstract).
Jan Göbel, Thorsten Holz, Philipp Trinius
2009Using Contextual Information for IDS Alarm Classification (Extended Abstract).
François Gagnon, Frédéric Massicotte, Babak Esfandiari
2009Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks.
Makoto Shimamura, Kenji Kono