%0 Conference Proceedings %T Information Flow Containment: A Practical Basis for Malware Defense %+ Stony Brook University [SUNY] (SBU) %A Sekar, R. %Z Part 1: Invited Papers %< avec comité de lecture %( Lecture Notes in Computer Science %B 23th Data and Applications Security (DBSec) %C Richmond, VA, United States %Y Yingjiu Li %I Springer %3 Data and Applications Security and Privacy XXV %V LNCS-6818 %P 1-3 %8 2011-07-11 %D 2011 %R 10.1007/978-3-642-22348-8_1 %Z Computer Science [cs]Conference papers %X Security threats have escalated rapidly in the past decade. “Zero-day attacks,” delivered via web pages, pictures or documents, have become significant threats. Malware is rampant, being installed using phishing, software vulnerability exploits, and software downloads. With the emergence of a lucrative black market in cyber crime, even ordinary users are becoming targets of sophisticated malware attacks. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01586591/document %2 https://inria.hal.science/hal-01586591/file/978-3-642-22348-8_1_Chapter.pdf %L hal-01586591 %U https://inria.hal.science/hal-01586591 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-6818