Sciweavers

DIMVA
2009
14 years 1 months ago
Towards Proactive Spam Filtering (Extended Abstract)
Jan Göbel, Thorsten Holz, Philipp Trinius
DIMVA
2009
14 years 1 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
DIMVA
2009
14 years 1 months ago
Selecting and Improving System Call Models for Anomaly Detection
Alessandro Frossi, Federico Maggi, Gian Luigi Rizz...
DIMVA
2009
14 years 1 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
DIMVA
2009
14 years 1 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
DIMVA
2009
14 years 1 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
DIMVA
2009
14 years 1 months ago
How Good Are Malware Detectors at Remediating Infected Systems?
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
DIMVA
2009
14 years 1 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
DIMVA
2009
14 years 1 months ago
A Case Study on Asprox Infection Dynamics
Abstract. The Asprox infection weaves a complex chain of dependencies involving bots that perform SQL injections on vulnerable web servers, and visitors whose machines get compromi...
Youngsang Shin, Steven A. Myers, Minaxi Gupta
DIMVA
2009
14 years 1 months ago
Polymorphing Software by Randomizing Data Structure Layout
Abstract. This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts f...
Zhiqiang Lin, Ryan Riley, Dongyan Xu