Abstract is missing.
- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005Brian Witten, Carey Nachenberg. 3-15 [doi]
- Static Disassembly and Code AnalysisGiovanni Vigna. 19-41 [doi]
- A Next-Generation Platform for Analyzing ExecutablesThomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum. 43-61 [doi]
- Behavioral and Structural Properties of Malicious CodeChristopher Kruegel. 63-83 [doi]
- Detection and Prevention of SQL Injection AttacksWilliam G. J. Halfond, Alessandro Orso. 85-109 [doi]
- Very Fast Containment of Scanning Worms, RevisitedNicholas Weaver, Stuart Staniford, Vern Paxson. 113-145 [doi]
- Sting: An End-to-End Self-Healing System for Defending against Internet WormsDavid Brumley, James Newsome, Dawn Song. 147-170 [doi]
- An Inside Look at BotnetsPaul Barford, Vinod Yegneswaran. 171-191 [doi]
- Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?Mihai Christodorescu, Shai Rubin. 193-209 [doi]
- Composite Hybrid Techniques For Defending Against Targeted AttacksStelios Sidiroglou, Angelos D. Keromytis. 213-229 [doi]
- Towards Stealthy Malware DetectionSalvatore J. Stolfo, Ke Wang, Wei-Jen Li. 231-249 [doi]
- Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy SystemsArvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, Pradeep K. Khosla. 253-289 [doi]
- Principles of Secure Information Flow AnalysisGeoffrey Smith. 291-307 [doi]