EC2ND 2010 Oct. 28, 2010 to Oct. 29, 2010, Germany

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Session: Privacy & Availability Martin Johns None Security
Ileak: A Lightweight System For Detecting Inadvertent Information Leaks Angelos Keromytis , Vasileios Kemerlis , Vasilis Pappas , Georgios Portokalidis None Security
Httpreject: Handling Overload Situations Without Losing The Contact To The User Joerg Schneider , Sebastian Koch None Security
Keynote: On Hackers Felix ( FX ) Lindner None Security
Session: Vulnerability Discovery Stefano Zanero None Security
An Evolutionary Computing Approach For Hunting Buffer Overflow Vulnerabilities: A Case Of Aiming In Dim Light Sanjay Rawat , Laurent Mounier None Security
Usb Device Drivers: A Stepping Stone Into Your Kernel Martin Johns , Moritz Jodeit None Security
Intrusion Detection Konrad Rieck None Security
Response Initiation In Distributed Intrusion Response Systems For Tactical Manets Gabriel Klein , Henning Rogge , Felix Schneider , Jens Tˆlle , Marko Jahnke , Stefan Karsch None Security
Empirical Evaluation Of The Internet Analysis System For Application In The Field Of Anomaly Detection Harald Lampesberger None Security
Machine Learning For Computer Security: Blessing Or Curse? Stefano Zanero , Konrad Rieck , John Mchugh , Sotiris Ioannidis None Security
Welcome And Opening Remarks Konrad Rieck None Security
Keynote: The Cyclic Nature Of Computer Security, Or Must We Always Go In Circles? John Mchugh None Security
Session: Malicious Software Sotiris Ioannidis None Security
Embedded Malware Ñ An Analysis Of The Chuck Norris Botnet Pavel Celeda , Radek Krejci , Jan Vykopal , Martin Drasa None Security
Experiences And Observations From The Noah Infrastructure Georgios Kontaxis , Iasonas Polakis , Spiros Antonatos , Evangelos P. Markatos None Security
Privacy Through Anonymous Communications? Hannes Federrath None Security