default search action
DIMVA 2011: Amsterdam, The Netherlands
- Thorsten Holz, Herbert Bos:
Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Lecture Notes in Computer Science 6739, Springer 2011, ISBN 978-3-642-22423-2
Network Security I
- Sebastiano Di Paola, Dario Lombardo:
Protecting against DNS Reflection Attacks with Bloom Filters. 1-16 - Su Zhang, Xinming Ou, John Homer:
Effective Network Vulnerability Assessment through Model Abstraction. 17-34 - Malek Ben Salem, Salvatore J. Stolfo:
Decoy Document Deployment for Effective Masquerade Attack Detection. 35-54
Attacks
- Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. 55-74 - Ge Zhang, Simone Fischer-Hübner:
Timing Attacks on PIN Input in VoIP Networks (Short Paper). 75-84
Web Security
- Martin Johns, Sebastian Lekies:
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests. 85-103 - Chuan Yue:
Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking. 104-123 - Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Escape from Monkey Island: Evading High-Interaction Honeyclients. 124-143
Network Security II
- Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin:
An Assessment of Overt Malicious Activity Manifest in Residential Networks. 144-163 - Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183 - Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). 184-193
Network Security II
- Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
Code Pointer Masking: Hardening Applications against Code Injection Attacks. 194-213 - Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti:
Operating System Interface Obfuscation and the Revealing of Hidden Operations. 214-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.