Table of Contents:
  • Host Security
  • HookScout: Proactive Binary-Centric Hook Detection
  • Conqueror: Tamper-Proof Code Execution on Legacy Systems
  • dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection
  • Trends
  • Evaluating Bluetooth as a Medium for Botnet Command and Control
  • Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
  • Covertly Probing Underground Economy Marketplaces
  • Vulnerabilities
  • Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners
  • Organizing Large Scale Hacking Competitions
  • Intrusion Detection
  • An Online Adaptive Approach to Alert Correlation
  • KIDS – Keyed Intrusion Detection System
  • Web Security
  • Modeling and Containment of Search Worms Targeting Web Applications
  • HProxy: Client-Side Detection of SSL Stripping Attacks.