Sciweavers

11 search results - page 1 / 3
» dimva 2008
Sort
View
77
Voted
DIMVA
2008
15 years 1 months ago
On the Limits of Information Flow Techniques for Malware Analysis and Containment
Lorenzo Cavallaro, Prateek Saxena, R. Sekar
DIMVA
2008
15 years 1 months ago
Traffic Aggregation for Malware Detection
Abstract. Stealthy malware, such as botnets and spyware, are hard to detect because their activities are subtle and do not disrupt the network, in contrast to DoS attacks and aggre...
Ting-Fang Yen, Michael K. Reiter
97
Voted
DIMVA
2008
15 years 1 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
100
Voted
DIMVA
2008
15 years 1 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
79
Voted
DIMVA
2008
15 years 1 months ago
On Race Vulnerabilities in Web Applications
Abstract A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, ...
Roberto Paleari, Davide Marrone, Danilo Bruschi, M...