Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Call Number: | Libro Electrónico |
---|---|
Corporate Author: | |
Other Authors: | , , , , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
New York, NY :
Springer US : Imprint: Springer,
2007.
|
Edition: | 1st ed. 2007. |
Series: | Advances in Information Security,
27 |
Subjects: | |
Online Access: | Texto Completo |
Table of Contents:
- Overview
- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
- Software Analysis and Assurance
- Static Disassembly and Code Analysis
- A Next-Generation Platform for Analyzing Executables
- Behavioral and Structural Properties of Malicious Code
- Detection and Prevention of SQL Injection Attacks
- Distributed Threat Detection and Defense
- Very Fast Containment of Scanning Worms, Revisited
- Sting: An End-to-End Self-Healing System for Defending against Internet Worms
- An Inside Look at Botnets
- Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
- Stealthy and Targeted Threat Detection and Defense
- Composite Hybrid Techniques For Defending Against Targeted Attacks
- Towards Stealthy Malware Detection
- Novel Techniques for Constructing Trustworthy Services
- Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
- Principles of Secure Information Flow Analysis.