did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642236433

Recent Advances in Intrusion Detection

by ; ;
  • ISBN13:

    9783642236433

  • ISBN10:

    364223643X

  • Format: Paperback
  • Copyright: 2011-11-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $74.99

Summary

This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

Table of Contents

Application Security
Minemu: The World's Fastest Taint Trackerp. 1
Erik Bosnian
DYMO: Tracking Dynamic Code Identityp. 21
Bob Gilbert
Automated Identification of Cryptographic Primitives in Binary Programsp. 41
Felix Grobert
Malware
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcodep. 61
Yanick Fratantonio
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malwarep. 81
Stefano Ortolani
Packed, Printable, and Polymorphic Return-Oriented Programmingp. 101
Kangjie Lu
On the Expressiveness of Return-into-libc Attacksp. 121
Minh Tran
Anomaly Detection
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Closep. 142
Nathaniel Boggs
Revisiting Traffic Anomaly Detection Using Software Defined Networkingp. 161
Syed Akbar Mehdi
Modeling User Search Behavior for Masquerade Detectionp. 181
Malek Ben Salem
Network Security
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attackp. 201
Sheila Becker
Detecting Traffic Snooping in Tor Using Decoysp. 222
Sambuddho Chakravarty
Cross-Analysis of Botnet Victims: New Insights and Implicationsp. 242
Seungwon Shin
Web Security and Social Networks
Banksafe Information Stealer Detection Inside the Web Browserp. 262
Armin Buescher
ICESHIELD: Detection and Mitigation of Malicious Websites with a Frozen DOMp. 281
Mario Heiderich
Spam Filtering in Twitter Using Sender-Receiver Relationshipp. 301
Jonghyuk Song
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammersp. 318
Chao Yang
Sandboxing and Embedded Environments
Detecting Environment-Sensitive Malwarep. 338
Martina Lindorfer
Defending Embedded Systems with Software Symbiotesp. 358
Ang Cui
What If You Can't Trust Your Network Card?p. 378
Loic Duflot
Author Indexp. 399
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program