


default search action
3rd MALWARE 2008: Alexandria, Virginia, USA
- 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-3288-2

- Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion:

Morphological detection of malware. 1-8 - Cristian Craioveanu:

Server-side script polumorphism: Techniques of analysis and defense. 9-16 - Li Sun, Tim Ebringer, S. Boztag:

An automatic anti-anti-VMware technique applicable for multi-stage packed malware. 17-23 - Jose Nazario, Thorsten Holz

:
As the net churns: Fast-flux botnet observations. 24-31 - Carlton R. Davis, José M. Fernandez

, Stephen Neville, John McHugh:
Sybil attacks as a mitigation strategy against the Storm botnet. 32-40 - David Dittrich, Sven Dietrich

:
P2P as botnet command and control: A deeper insight. 41-48 - Jamie Levy, Jaroslaw Paduch, Bilal Khan:

Superimposing permutational covert channels onto reliable stream protocols. 49-56 - Sushant Sinha, Michael D. Bailey, Farnam Jahanian:

Shades of grey: On the effectiveness of reputation-based "blacklists". 57-64 - Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock:

Image spam - ASCII to the rescue! 65-68 - Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:

Function length as a tool for malware classification. 69-76 - Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia:

Using Markov chains to filter machine-morphed variants of malicious programs. 77-84 - Vinoo Thomas, Nitin Jyoti:

Combating file infectors on corporate networks. 85-91 - Fernando C. Colón Osorio:

State of wireless security implementations in the United States and Europe - empirical data. 92-97 - David Harley, Pierre-Marc Bureau:

Drive-by downloads from the trenches. 98-103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














