Veranstaltung: | Dienstags von 14-16Uhr in Raum 02.07.034 |
---|---|
Datum | Thema | Bearbeiter |
---|---|---|
Forms of Malware | ||
27.01.09 | Malicious Code | Christian Ivicevic |
Worm Propagation | ||
09.12.08 | Viral Techniques | Jan Seeger |
Trojan horses, Backdoors, ... | ||
Security vulnerabilities | ||
13.01.09 | Code Obfuscation | Christoph Schindlbeck |
Buffer Overflows | ||
APEG | ||
Techniques for detecting Malware | ||
Intrusion Detection | ||
16.12.08 | Anti-viral programs | Mahmoodreza Shirinsokhan |
Sandboxing | ||
Statical Analysis of malicious code | ||
20.01.09 | Model Checking of malicious code | Lars Wederhake |