Table of Content
Attack Prevention.- Data Space Randomization.- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks.- Veri Key: A Dynamic Certificate Verification System for Public Key Exchanges.- Malware Detection and Prevention (I).- Dynamic Binary Instrumentation-Based Framework for Malware Defense.- Embedded Malware Detection Using Markov n-Grams.- Learning and Classification of Malware Behavior.- Attack Techniques and Vulnerability Assessment.- On Race Vulnerabilities in Web Applications.- On the Limits of Information Flow Techniques for Malware Analysis and Containment.- Malware Detection and Prevention (II).- Expanding Malware Defense by Securing Software Installations.- Flu XOR: Detecting and Monitoring Fast-Flux Service Networks.- Traffic Aggregation for Malware Detection.- Intrusion Detection and Activity Correlation.- The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors.- The Quest for Multi-headed Worms.- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.