By Erik Bosman, Asia Slowinska, Herbert Bos (auth.), Robin Sommer, Davide Balzarotti, Gregor Maier (eds.)

This publication constitutes the complaints of the 14th foreign Symposium on fresh Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, united states in September 2011.
The 20 papers offered have been conscientiously reviewed and chosen from 87 submissions. The papers are prepared in topical sections on program safeguard; malware; anomaly detection; net safety and social networks; and sandboxing and embedded environments.

Show description

Read or Download Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings PDF

Best international books

The Routledge International Handbook of Globalization Studies (Routledge International Handbooks)

The Routledge International Handbook of Globalization experiences bargains scholars transparent and proficient chapters at the heritage of globalization and key theories that experience thought of the explanations and results of the globalization method. There are significant sections taking a look at demographic, fiscal, technological, social and cultural adjustments in globalization.

The Chern Symposium 1979: Proceedings of the International Symposium on Differential Geometry in honor of S.-S. Chern, held in Berkeley, California, June 1979

This quantity attests to the power of differential geometry because it probes deeper into its inner constitution and explores ever widening connections with different topics in arithmetic and physics. To such a lot people Professor S. S. Chern is smooth differential geometry, and we, his scholars, are thankful to him for top us to this fertile panorama.

Partially Supervised Learning: Second IAPR International Workshop, PSL 2013, Nanjing, China, May 13-14, 2013, Revised Selected Papers

This ebook constitutes the completely refereed revised chosen papers from the second one IAPR overseas Workshop, PSL 2013, held in Nanjing, China, in might 2013. the ten papers integrated during this quantity have been rigorously reviewed and chosen from 26 submissions. in part supervised studying is a speedily evolving region of desktop studying.

Additional resources for Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings

Sample text

If this task can be automated, a faster analysis of malware is possible, thus enabling security teams to respond quickly to emerging Internet threats. In this paper, we study the problem of identifying the type of cryptographic primitives used by a given binary program. If a standardized cryptographic primitive such as AES, DES, or RC4 is used, we want to identify the algorithm, verify the instance of the primitive, and extract the parameters used during this invocation. , who introduced a heuristic based on changes in the code structure when cryptographic code is executed [20].

For example, consider a just-in-time compiler for JavaScript that runs in a browser. Obviously, the code that is generated by this JIT compiler component depends on the web pages that the user visits. Thus, hashes associated with these code regions likely change very frequently. As a result, even though the hash would precisely capture the generated code, its value is essentially meaningless. For this reason, we decided not to hash dynamic code regions directly. Instead, whenever there are dynamically created, executable memory regions, we add information to the label that reflects the generated code and the library responsible for it.

8 1 Fig. 1. DLL loading over time it is an acceptable overhead. We speculate that the higher overhead of Internet Explorer can be attributed to its multi-process, Loosely-Coupled IE (LCIE) architecture [23], which results in Dymo duplicating its initialization efforts over the frame and tab processes. Table 1. Startup times (in milliseconds) Application Without Dymo With Dymo Overhead Internet Explorer Firefox Thunderbird 447 450 799 804 634 1047 80% 41% 31% In addition to the worst-case overhead during application startup, we were also interested in understanding the performance penalty due to our modifications to the memory management routines and, in particular, the page fault handler.

Download PDF sample

Rated 4.76 of 5 – based on 8 votes