Abstract is missing.
- A Case Study on Asprox Infection DynamicsYoungsang Shin, Steven A. Myers, Minaxi Gupta. 1-20 [doi]
- How Good Are Malware Detectors at Remediating Infected Systems?Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni. 21-37 [doi]
- Towards Proactive Spam Filtering (Extended Abstract)Jan Göbel, Thorsten Holz, Philipp Trinius. 38-47 [doi]
- Shepherding Loadable Kernel Modules through On-demand EmulationChaoting Xuan, John A. Copeland, Raheem A. Beyah. 48-67 [doi]
- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning AttacksMakoto Shimamura, Kenji Kono. 68-87 [doi]
- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection AttacksManuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda. 88-106 [doi]
- Polymorphing Software by Randomizing Data Structure LayoutZhiqiang Lin, Ryan Riley, Dongyan Xu. 107-126 [doi]
- On the Effectiveness of Software Diversity: A Systematic Study on Real-World VulnerabilitiesJin Han, Debin Gao, Robert H. Deng. 127-146 [doi]
- Using Contextual Information for IDS Alarm Classification (Extended Abstract)François Gagnon, Frédéric Massicotte, Babak Esfandiari. 147-156 [doi]
- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and ImplicationsTing-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter. 157-175 [doi]
- A Service Dependency Modeling Framework for Policy-Based Response EnforcementNizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka. 176-195 [doi]
- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract)Christian Bockermann, Martin Apel, Michael Meier. 196-205 [doi]
- Selecting and Improving System Call Models for Anomaly DetectionAlessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero. 206-223 [doi]