Get Free Shipping on orders over $89
Lecture Notes in Electrical Engineering : Lecture Notes in Electrical Engineering - Vasilios Siris

Lecture Notes in Electrical Engineering

By: Vasilios Siris (Editor), Sotiris Ioannidis (Editor), Kostas Anagnostakis (Editor)

Paperback | 4 December 2008

At a Glance

Paperback


$249.00

or 4 interest-free payments of $62.25 with

 or 

Ships in 5 to 7 business days

The 3rd European Conference on Computer Network Defense took place in September 2007 at Aldemar Hotel, in Heraklion, Crete, Greece in cooperation with the European Network and Information Security Agency (ENISA). The theme of the conference was the protection of computer networks. The conference drew participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. The conference was a great success, with 6 refereed papers and 6 invited presentations on topics ranging from high assurance networks of virtual machines to signaling vulnerabilities in wiretapping systems. This book contains the refereed as well as refereed papers. We are greatful to the authors and presenters for their contributions, as well as the participants of EC2N'07 for making the conference a success. We are looking forward to a successful EC2ND event in 2008. K. G. Anagnostakis, S. Ioannidis, V. Siris Contents 1 Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting ........................................1 Michael Valkering, Asia Slowinska, and Herbert Bos 1 Introduction ......................................................................................... 1 2 Architecture ......................................................................................... 3 2.1 Tracking Issues .............................................................................. 4 2.2 Retainting ...................................................................................... 6 2.2.1 Determining the Tag ............................................................. 6 2.2.2 Identifying the SSL Conversation ........................................ 8 2.3 Interposition Details...................................................................... 9 3 Signature Generation ........................................................................... 9 3.1 Pattern-Based Signatures ............................................................. 10 3.2 Signatures for Polymorphic Buffer Overflows ............................ 13 4 Filters ................................................................................................. 14 5 Results ............................................................................................... 15 6 Related Work ..................................................................................... 17 7 Conclusions ....................................................................................... 18 References ............................................................................................ 18 2 Towards High Assurance Networks of Virtual Machines...............21

More in Computer Hardware

iPad and iPad Pro For Dummies - Paul McFedries

RRP $52.95

$40.75

23%
OFF
Microsoft Project For Dummies : For Dummies (Computer/Tech) - Cynthia Snyder Dionisio
Site Reliability Engineering : How Google Runs Production Systems - Betsy Beyer
Linux All-In-One For Dummies : For Dummies (Computer/Tech) - Richard Blum
Windows 11 For Dummies, 2nd Edition : Windows 11 For Dummies - Alan Simpson
Troubleshooting PCs For Dummies : For Dummies (Computer/Tech) - Dan Gookin
Learning Git : A Hands-On and Visual Guide to the Basics of Git - Anna Skoulikari
Macs For Seniors For Dummies : For Dummies (Computer/Tech) - Mark L. Chambers
MacBook For Dummies : Macbook for Dummies - Mark L. Chambers

RRP $49.95

$37.75

24%
OFF
Windows 11 All-in-One For Dummies, 2nd Edition : For Dummies - Ciprian Adrian Rusen
Build Your Own PC Do-It-Yourself For Dummies : For Dummies (Computer/Tech) - Mark L. Chambers
Samsung Galaxy Tabs For Dummies : For Dummies (Computer/Tech) - Dan Gookin
iPad For Seniors For Dummies : iPad for Seniors For Dummies - Dwight Spivey