Application Security | |
Minemu: The World's Fastest Taint Tracker | p. 1 |
Erik Bosnian | |
DYMO: Tracking Dynamic Code Identity | p. 21 |
Bob Gilbert | |
Automated Identification of Cryptographic Primitives in Binary Programs | p. 41 |
Felix Grobert | |
Malware | |
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode | p. 61 |
Yanick Fratantonio | |
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware | p. 81 |
Stefano Ortolani | |
Packed, Printable, and Polymorphic Return-Oriented Programming | p. 101 |
Kangjie Lu | |
On the Expressiveness of Return-into-libc Attacks | p. 121 |
Minh Tran | |
Anomaly Detection | |
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close | p. 142 |
Nathaniel Boggs | |
Revisiting Traffic Anomaly Detection Using Software Defined Networking | p. 161 |
Syed Akbar Mehdi | |
Modeling User Search Behavior for Masquerade Detection | p. 181 |
Malek Ben Salem | |
Network Security | |
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack | p. 201 |
Sheila Becker | |
Detecting Traffic Snooping in Tor Using Decoys | p. 222 |
Sambuddho Chakravarty | |
Cross-Analysis of Botnet Victims: New Insights and Implications | p. 242 |
Seungwon Shin | |
Web Security and Social Networks | |
Banksafe Information Stealer Detection Inside the Web Browser | p. 262 |
Armin Buescher | |
ICESHIELD: Detection and Mitigation of Malicious Websites with a Frozen DOM | p. 281 |
Mario Heiderich | |
Spam Filtering in Twitter Using Sender-Receiver Relationship | p. 301 |
Jonghyuk Song | |
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers | p. 318 |
Chao Yang | |
Sandboxing and Embedded Environments | |
Detecting Environment-Sensitive Malware | p. 338 |
Martina Lindorfer | |
Defending Embedded Systems with Software Symbiotes | p. 358 |
Ang Cui | |
What If You Can't Trust Your Network Card? | p. 378 |
Loic Duflot | |
Author Index | p. 399 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.