9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment 2012 July 26, 2012 to July 27, 2012, Heraklion, Crete, Greece

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Keynote "Finding concurrency and memory errors in C++ programs", Manuel Costa Abstract: Concurrent programming errors arise when threads share data incorrectly. Programmers often avoid these errors ...
Network Security I Sven Dietrich N/A Security
Protecting against DNS reflection attacks with Bloom filters Sebastiano di Paola , Dario Lombardo N/A
Effective Network Vulnerability Assessment through Model Abstraction Xinming Ou , Su Zhang , John Homer N/A
Decoy Document Deployment for Effective Masquerade Attack Detection Malek ben Salem , Salvatore. J. Stolfo N/A
"The Quest for Trusted Computing: Promises, Expectations, Practice, and Challenges", Ahmad-reza Sadeghi "Abstract: Trusted Computing (TC) aims at providing a framework to establish trust among the components ... Security
Attacks Michael Meier N/A Security
Reverse Social Engineering Attacks in Online Social Networks Calton Pu , Engin Kirda , Davide Balzarotti , Danesh Irani , Marco Balduzzi N/A
Timing attacks on VoIP PIN input Ge Zhang , Simone Fischer-hbner N/A
"Using Traffic Direction Systems to simplify fraud... and complicate investigations!", Max Goncharov Abstract: Directing traffic to cash in on referrals is a common and legitimate method of ... Security
Web Security Paolo Milani Comparetti N/A Security
Biting the hand that serves you: A closer look at client-side Flash proxies for cross-domain requests Martin Johns , Sebastian Lekies N/A
Mitigating Cross-Site Form History Spamming Attacks with Domain-based Ranking Chuan Yue N/A Security
Escape from Monkey Island: Evading High-Interaction Honeyclients Christopher Kruegel , Giovanni Vigna , Marco Cova , Alexandros Kapravelos N/A
Network Security II Ulrich Flegel N/A Security
An Assessment of Overt Malicious Activity Manifest in Residential Network Anja Feldmann , Robin Sommer , Vern Paxson , Gregor Maier , Matthias Vallentin N/A
What's Clicking What? Techniques and Innovations of Today's Clickbots Christian Kreibich , Chris Grier , Vern Paxson , Brad Miller , Paul Pearce N/A
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) Christopher Kruegel , Giovanni Vigna , Greg Banks , Richard A. Kemmerer , Aristide Fattori N/A
Host Security Lorenzo Cavallaro N/A Security
Code Pointer Masking: Hardening Applications against Code Injection Attacks Yves Younan , Frank Piessens , Pieter Philippaerts , Stijn Muylle , Sven Lachmund , Thomas Walter N/A