Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Corporate Author: | |
---|---|
Other Authors: | , , , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA :
Springer US,
2007.
|
Series: | Advances in Information Security,
27 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Overview
- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
- Software Analysis and Assurance
- Static Disassembly and Code Analysis
- A Next-Generation Platform for Analyzing Executables
- Behavioral and Structural Properties of Malicious Code
- Detection and Prevention of SQL Injection Attacks
- Distributed Threat Detection and Defense
- Very Fast Containment of Scanning Worms, Revisited
- Sting: An End-to-End Self-Healing System for Defending against Internet Worms
- An Inside Look at Botnets
- Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
- Stealthy and Targeted Threat Detection and Defense
- Composite Hybrid Techniques For Defending Against Targeted Attacks
- Towards Stealthy Malware Detection
- Novel Techniques for Constructing Trustworthy Services
- Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
- Principles of Secure Information Flow Analysis.