Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Advances in Information Security,
27 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Overview
- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
- Software Analysis and Assurance
- Static Disassembly and Code Analysis
- A Next-Generation Platform for Analyzing Executables
- Behavioral and Structural Properties of Malicious Code
- Detection and Prevention of SQL Injection Attacks
- Distributed Threat Detection and Defense
- Very Fast Containment of Scanning Worms, Revisited
- Sting: An End-to-End Self-Healing System for Defending against Internet Worms
- An Inside Look at Botnets
- Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
- Stealthy and Targeted Threat Detection and Defense
- Composite Hybrid Techniques For Defending Against Targeted Attacks
- Towards Stealthy Malware Detection
- Novel Techniques for Constructing Trustworthy Services
- Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
- Principles of Secure Information Flow Analysis.