Malware Detection

Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Christodorescu, Mihai (Επιμελητής έκδοσης), Jha, Somesh (Επιμελητής έκδοσης), Maughan, Douglas (Επιμελητής έκδοσης), Song, Dawn (Επιμελητής έκδοσης), Wang, Cliff (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2007.
Σειρά:Advances in Information Security, 27
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Overview
  • Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
  • Software Analysis and Assurance
  • Static Disassembly and Code Analysis
  • A Next-Generation Platform for Analyzing Executables
  • Behavioral and Structural Properties of Malicious Code
  • Detection and Prevention of SQL Injection Attacks
  • Distributed Threat Detection and Defense
  • Very Fast Containment of Scanning Worms, Revisited
  • Sting: An End-to-End Self-Healing System for Defending against Internet Worms
  • An Inside Look at Botnets
  • Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
  • Stealthy and Targeted Threat Detection and Defense
  • Composite Hybrid Techniques For Defending Against Targeted Attacks
  • Towards Stealthy Malware Detection
  • Novel Techniques for Constructing Trustworthy Services
  • Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
  • Principles of Secure Information Flow Analysis.