


default search action
9th MALWARE 2014: Fajardo, PR, USA
- 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7328-6

Emerging Threats and Malware Classification
- Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas:

Identifying malware genera using the Jensen-Shannon distance between system call traces. 1-7 - Thomas Barabosch, Elmar Gerhards-Padilla:

Host-based code injection attacks: A popular technique used by malware. 8-17 - Wenbiao Ding, Xiao Xing, Ping Chen, Zhi Xin, Bing Mao:

Automatic construction of printable return-oriented programming payload. 18-25
The Measurement Problem
- Jeffrey Wu, Anthony Arrott, Fernando C. Colón Osorio:

Protection against remote code execution exploits of popular applications in Windows. 26-31 - Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio:

Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. 35-42 - Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio:

Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. 40-49
Mobile Malware
- Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon

, Heejo Lee, John Milburn:
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. 50-57 - Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. 58-67 - Joshua Saxe, Rafael Turner, Kristina Blokhin:

CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. 68-75
Botnets & Other Musings
- Muhammad ElSheikh

, Mohammed S. Gadelrab
, Mahmoud A. Ghoneim, Mohsen A. Rashwan
:
BoTGen: A new approach for in-lab generation of botnet datasets. 76-84 - Jonghoon Kwon

, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: Power spectral density analysis for detecting botnet groups. 85-92 - Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson

:
Fighting banking botnets by exploiting inherent command and control vulnerabilities. 93-100 - Mark E. Fioravanti II, Richard Ford:

Bacterial quorum sensing for coordination of targeted malware. 101-108
HoneyAgents, Intelligent Defenses, and other Anti-Malware techniques
- Jan Gassen, Jonathan P. Chapman:

HoneyAgent: Detecting malicious Java applets by using dynamic analysis. 109-117 - Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier

:
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. 118-127 - Fanny Lalonde Lévesque, José M. Fernandez

, Anil Somayaji:
Risk prediction of malware victimization based on user behavior. 128-134 - William Casey, Evan Wright, Jose Andre Morales

, Michael Appel, Jeff Gennari, Bud Mishra:
Agent-based trace learning in a recommendation-verification system for cybersecurity. 135-143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














