Cargando…

Malware Detection

Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Christodorescu, Mihai (Editor ), Jha, Somesh (Editor ), Maughan, Douglas (Editor ), Song, Dawn (Editor ), Wang, Cliff (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Advances in Information Security, 27
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Overview
  • Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
  • Software Analysis and Assurance
  • Static Disassembly and Code Analysis
  • A Next-Generation Platform for Analyzing Executables
  • Behavioral and Structural Properties of Malicious Code
  • Detection and Prevention of SQL Injection Attacks
  • Distributed Threat Detection and Defense
  • Very Fast Containment of Scanning Worms, Revisited
  • Sting: An End-to-End Self-Healing System for Defending against Internet Worms
  • An Inside Look at Botnets
  • Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
  • Stealthy and Targeted Threat Detection and Defense
  • Composite Hybrid Techniques For Defending Against Targeted Attacks
  • Towards Stealthy Malware Detection
  • Novel Techniques for Constructing Trustworthy Services
  • Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
  • Principles of Secure Information Flow Analysis.