default search action
DIMVA 2005: Vienna, Austria
- Klaus Julisch, Christopher Krügel:
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings. Lecture Notes in Computer Science 3548, Springer 2005, ISBN 3-540-26613-5
Obfuscated Code Detection
- Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia:
Analyzing Memory Accesses in Obfuscated x86 Executables. 1-18 - Udo Payer, Peter Teufl, Mario Lamberger:
Hybrid Engine for Polymorphic Shellcode Detection. 19-31
Honeypots
- Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong:
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. 32-50 - Fabien Pouget, Thorsten Holz:
A Pointillist Approach for Comparing Honeypots. 51-68
Vulnerability Assessment and Exploit Analysis
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. 69-84 - Ulf Larson, Emilie Lundin Barse, Erland Jonsson:
METAL - A Tool for Extracting Attack Manifestations. 85-102 - Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner:
Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. 103-122
Anomaly Detection
- Fredrik Valeur, Darren Mutz, Giovanni Vigna:
A Learning-Based Approach to the Detection of SQL Attacks. 123-140 - Mario Latendresse:
Masquerade Detection via Customized Grammars. 141-159 - Suraiya Khan, Issa Traoré:
A Prevention Model for Algorithmic Complexity Attacks. 160-173
Misuse Detection
- Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Detecting Malicious Code by Model Checking. 174-187 - Michael Meier, Sebastian Schmerl, Hartmut König:
Improving the Efficiency of Misuse Detection. 188-205
Distributed Intrusion Detection and IDS Testing
- Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. 206-221 - Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson:
TCPtransform: Property-Oriented TCP Traffic Transformation. 222-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.