© 2008

Detection of Intrusions and Malware, and Vulnerability Assessment

5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

  • Editors
  • Diego Zamboni
Conference proceedings DIMVA 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5137)

Table of contents

  1. Front Matter
  2. Attack Prevention

    1. Sandeep Bhatkar, R. Sekar
      Pages 1-22
    2. Prithvi Bisht, V. N. Venkatakrishnan
      Pages 23-43
    3. Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin Almeroth, Christopher Kruegel
      Pages 44-63
  3. Malware Detection and Prevention (I)

    1. Najwa Aaraj, Anand Raghunathan, Niraj K. Jha
      Pages 64-87
    2. M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq
      Pages 88-107
    3. Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov
      Pages 108-125
  4. Attack Techniques and Vulnerability Assessment

    1. Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga
      Pages 126-142
    2. Lorenzo Cavallaro, Prateek Saxena, R. Sekar
      Pages 143-163
  5. Malware Detection and Prevention (II)

    1. Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan
      Pages 164-185
    2. Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi
      Pages 186-206
    3. Ting-Fang Yen, Michael K. Reiter
      Pages 207-227
  6. Intrusion Detection and Activity Correlation

    1. Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary
      Pages 247-266
    2. Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson
      Pages 267-278
  7. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in Paris, France in July 2008.

The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on attack prevention, malware detection and prevention, attack techniques and vulnerability assessment, and intrusion detection and activity correlation.


access control address space randomization anomaly detection attack prevention audit control authentication buffer overflow cross-site scripting cryptographic algorithms filtering honeypots intrusion detection malicious code malware network;

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking