Eldorado Community: Sixth Conference on Detection of Intrusions and Malware & Vulnerability AssessmentSixth Conference on Detection of Intrusions and Malware & Vulnerability Assessmenthttp://hdl.handle.net/2003/262922024-03-19T13:19:13Z2024-03-19T13:19:13ZCipher 5Pimenidis, Lexihttp://hdl.handle.net/2003/263132015-08-12T17:37:51Z2009-07-29T15:47:26ZTitle: Cipher 5
Authors: Pimenidis, Lexi2009-07-29T15:47:26ZSelecting and Improving System Call Models for Anomaly DetectionFrossi, AlessandroMaggi, FedericoRizzo, Gian L.Zanero, Stefanohttp://hdl.handle.net/2003/263122015-08-12T17:38:04Z2009-07-29T15:47:22ZTitle: Selecting and Improving System Call Models for Anomaly Detection
Authors: Frossi, Alessandro; Maggi, Federico; Rizzo, Gian L.; Zanero, Stefano2009-07-29T15:47:22ZLearning SQL for Database Intrusion Detection using Context-sensitive ModellingApel, MartinBockermann, ChristianMeier, Michaelhttp://hdl.handle.net/2003/263112015-08-12T17:37:56Z2009-07-29T15:47:19ZTitle: Learning SQL for Database Intrusion Detection using Context-sensitive Modelling
Authors: Apel, Martin; Bockermann, Christian; Meier, Michael2009-07-29T15:47:19ZBrowser SSL-FingerprintingBockermann, Christianhttp://hdl.handle.net/2003/263102015-08-12T17:37:47Z2009-07-29T15:47:17ZTitle: Browser SSL-Fingerprinting
Authors: Bockermann, Christian2009-07-29T15:47:17ZBypassing Kernel-Integrity Protection MechanismsFreiling, FelixHolz, ThorstenHund, Ralfhttp://hdl.handle.net/2003/263092015-08-12T17:37:49Z2009-07-29T15:47:14ZTitle: Bypassing Kernel-Integrity Protection Mechanisms
Authors: Freiling, Felix; Holz, Thorsten; Hund, Ralf2009-07-29T15:47:14ZTracking Intelligence ProjectDell'Aera, Angelohttp://hdl.handle.net/2003/263082015-08-13T00:59:42Z2009-07-29T15:47:12ZTitle: Tracking Intelligence Project
Authors: Dell'Aera, Angelo2009-07-29T15:47:12ZVisualization of Malware BehaviorTrinius, Philipphttp://hdl.handle.net/2003/263072015-08-13T00:59:55Z2009-07-29T15:47:09ZTitle: Visualization of Malware Behavior
Authors: Trinius, Philipp2009-07-29T15:47:09ZAre botnets used to run phishing over the phone?Maggi, Federicohttp://hdl.handle.net/2003/263062015-08-12T17:37:43Z2009-07-29T15:47:07ZTitle: Are botnets used to run phishing over the phone?
Authors: Maggi, Federico2009-07-29T15:47:07ZA Service Dependency Modeling Framework for Policy-based Response EnforcementCuppens-Boulahia, NoraCuppens, FrédéricDebar, HervéKheir, NizarViinikka, Jounihttp://hdl.handle.net/2003/263052015-08-12T17:38:06Z2009-07-29T15:47:04ZTitle: A Service Dependency Modeling Framework for Policy-based Response Enforcement
Authors: Cuppens-Boulahia, Nora; Cuppens, Frédéric; Debar, Hervé; Kheir, Nizar; Viinikka, Jouni2009-07-29T15:47:04ZBrowser Fingerprinting from Coarse Traffic SummariesHuang, XinMonrose, FabianReiter, Michael K.Yen, Ting-Fanghttp://hdl.handle.net/2003/263042015-08-12T17:37:45Z2009-07-29T15:47:02ZTitle: Browser Fingerprinting from Coarse Traffic Summaries
Authors: Huang, Xin; Monrose, Fabian; Reiter, Michael K.; Yen, Ting-Fang2009-07-29T15:47:02ZUsing Contextual Information for IDS Alarm ClassificationEsfandiari, BabakGagnon, FrancoisMassicotte, Frédérichttp://hdl.handle.net/2003/263032015-08-13T00:59:53Z2009-07-29T15:46:59ZTitle: Using Contextual Information for IDS Alarm Classification
Authors: Esfandiari, Babak; Gagnon, Francois; Massicotte, Frédéric2009-07-29T15:46:59ZOn the Effectiveness of Software DiversityDeng, Robert H.Gao, DebinHan, Jinhttp://hdl.handle.net/2003/263022015-08-12T17:37:58Z2009-07-29T15:46:57ZTitle: On the Effectiveness of Software Diversity
Authors: Deng, Robert H.; Gao, Debin; Han, Jin2009-07-29T15:46:57ZPolymorphing Software by Randomizing Data Structure LayoutLin, ZhiqiangRiley, RyanXu, Dongyanhttp://hdl.handle.net/2003/263012015-08-12T17:38:00Z2009-07-29T15:46:54ZTitle: Polymorphing Software by Randomizing Data Structure Layout
Authors: Lin, Zhiqiang; Riley, Ryan; Xu, Dongyan2009-07-29T15:46:54ZHow to Steal a Botnet and What Can Happen When You DoKemmerer, Richardhttp://hdl.handle.net/2003/263002015-08-12T17:37:54Z2009-07-29T15:46:52ZTitle: How to Steal a Botnet and What Can Happen When You Do
Authors: Kemmerer, Richard2009-07-29T15:46:52ZDefending Browsers against Drive-by DownloadsEgele, ManuelKirda, EnginKruegel, ChristopherWurzinger, Peterhttp://hdl.handle.net/2003/262992015-08-12T17:37:53Z2009-07-29T15:46:49ZTitle: Defending Browsers against Drive-by Downloads
Authors: Egele, Manuel; Kirda, Engin; Kruegel, Christopher; Wurzinger, Peter2009-07-29T15:46:49ZYataglassKono, KenjiShimamura, Makatohttp://hdl.handle.net/2003/262982015-08-13T01:00:01Z2009-07-29T15:46:47ZTitle: Yataglass
Authors: Kono, Kenji; Shimamura, Makato2009-07-29T15:46:47ZShepherding Loadable Kernel Module through On-demand EmulationBeyah, RaheemCopeland, JohnXuan, Chaotinghttp://hdl.handle.net/2003/262972015-08-13T00:59:38Z2009-07-29T15:46:45ZTitle: Shepherding Loadable Kernel Module through On-demand Emulation
Authors: Beyah, Raheem; Copeland, John; Xuan, Chaoting2009-07-29T15:46:45ZTowards Proactive SPAM FilteringGöbel, JanHolz, ThorstenTrinius, Philipphttp://hdl.handle.net/2003/262962015-08-13T00:59:40Z2009-07-29T15:46:42ZTitle: Towards Proactive SPAM Filtering
Authors: Göbel, Jan; Holz, Thorsten; Trinius, Philipp2009-07-29T15:46:42ZA Case Study on Asprox Infection DynamicsGupta, MinaxiMyers, StevenShin, Youngsanghttp://hdl.handle.net/2003/262952015-08-13T01:06:38Z2009-07-29T15:46:40ZTitle: A Case Study on Asprox Infection Dynamics
Authors: Gupta, Minaxi; Myers, Steven; Shin, Youngsang2009-07-29T15:46:40ZProgram, Selection and StatisticsFlegel, Ulrichhttp://hdl.handle.net/2003/262942015-08-12T17:38:02Z2009-07-29T15:46:36ZTitle: Program, Selection and Statistics
Authors: Flegel, Ulrich2009-07-29T15:46:36Z