Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/malware:"
@inproceedings{DBLP:conf/malware/AlsulamiM18, author = {Bander Alsulami and Spiros Mancoridis}, title = {Behavioral Malware Classification using Convolutional Recurrent Neural Networks}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {103--111}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659358}, doi = {10.1109/MALWARE.2018.8659358}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/malware/AlsulamiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AnDNWM18, author = {Ni An and Alexander M. Duff and Mahshid Noorani and Steven Weber and Spiros Mancoridis}, title = {Malware Anomaly Detection on Virtual Assistants}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {124--131}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659366}, doi = {10.1109/MALWARE.2018.8659366}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AnDNWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FleshmanRZMN18, author = {William Fleshman and Edward Raff and Richard Zak and Mark McLean and Charles Nicholas}, title = {Static Malware Detection {\&} Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {3--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659360}, doi = {10.1109/MALWARE.2018.8659360}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FleshmanRZMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HechtSE18, author = {Asaf Hecht and Adi Sagi and Yuval Elovici}, title = {{PIDS:} {A} Behavioral Framework for Analysis and Detection of Network Printer Attacks}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {87--94}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659371}, doi = {10.1109/MALWARE.2018.8659371}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HechtSE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/IqbalZ18, author = {Shahrear Iqbal and Mohammad Zulkernine}, title = {SpyDroid: {A} Framework for Employing Multiple Real-Time Malware Detectors on Android}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {33--40}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659365}, doi = {10.1109/MALWARE.2018.8659365}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/IqbalZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JillepalliLJCOA18, author = {Ananth A. Jillepalli and Daniel Conte de Leon and Brian K. Johnson and Yacine Chakhchoukh and Ibukun A. Oyewumi and Mohammad Ashrafuzzaman and Frederick T. Sheldon and Jim Alves{-}Foss and Michael A. Haney}, title = {{METICS:} {A} Holistic Cyber Physical System Model for {IEEE} 14-bus Power System Security}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {95--102}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659367}, doi = {10.1109/MALWARE.2018.8659367}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/JillepalliLJCOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KesidisSFSK18, author = {George Kesidis and Yuquan Shan and Daniel Fleck and Angelos Stavrou and Takis Konstantopoulos}, title = {An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance\({}^{\mbox{*}}\)}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {61--67}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659359}, doi = {10.1109/MALWARE.2018.8659359}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KimMMB18, author = {Danny Kim and Daniel Mirsky and Amir Majlesi{-}Kupaei and Rajeev Barua}, title = {A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {115--123}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659373}, doi = {10.1109/MALWARE.2018.8659373}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KimMMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KleinBCBR18, author = {Rory Klein and Tyler Barkley and Weston Clizbe and Jennifer Bateman and Julian L. Rrushi}, title = {Model-driven Timing Consistency for Active Malware Redirection}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {132--141}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659370}, doi = {10.1109/MALWARE.2018.8659370}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KleinBCBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LemayL18, author = {Antoine Lemay and Sylvain P. Leblanc}, title = {Is eval {()} Evil : {A} study of JavaScript in {PDF} malware}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {13--22}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659374}, doi = {10.1109/MALWARE.2018.8659374}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/LemayL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MedinaNCP18, author = {Ramon P. Medina and Elijah B. Neundorfer and Radhouane Chouchane and Alfredo J. Perez}, title = {{PRAST:} Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {41--48}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659369}, doi = {10.1109/MALWARE.2018.8659369}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/MedinaNCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MedurySB018, author = {Sai Medury and Anthony Skjellum and Richard R. Brooks and Lu Yu}, title = {SCRaaPS: {X.509} Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {145--152}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659364}, doi = {10.1109/MALWARE.2018.8659364}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/MedurySB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MichaudDL18, author = {Michael James Michaud and Thomas R. Dean and Sylvain P. Leblanc}, title = {Attacking {OMG} Data Distribution Service {(DDS)} Based Real-Time Mission Critical Distributed Systems}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {68--77}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659368}, doi = {10.1109/MALWARE.2018.8659368}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/MichaudDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OakleyW0BS18, author = {Jonathan Oakley and Carl R. Worley and Lu Yu and Richard R. Brooks and Anthony Skjellum}, title = {Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {161--166}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659357}, doi = {10.1109/MALWARE.2018.8659357}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/OakleyW0BS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ParkerMJB18, author = {Colby Parker and Jeffrey Todd McDonald and Tom Johnsten and Ryan G. Benton}, title = {Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {49--58}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659372}, doi = {10.1109/MALWARE.2018.8659372}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/ParkerMJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PietAM18, author = {Julien Piet and Blake Anderson and David A. McGrew}, title = {An In-Depth Study of Open-Source Command and Control Frameworks}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {23--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659361}, doi = {10.1109/MALWARE.2018.8659361}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/PietAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WangZJT18, author = {Chang Wang and Zhaolong Zhang and Xiaoqi Jia and Donghai Tian}, title = {Binary Obfuscation Based Reassemble}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {153--160}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659363}, doi = {10.1109/MALWARE.2018.8659363}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WangZJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZhaoL18, author = {Bingyin Zhao and Yingjie Lao}, title = {Resilience of Pruned Neural Network Against Poisoning Attack}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {78--83}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659362}, doi = {10.1109/MALWARE.2018.8659362}, timestamp = {Sat, 09 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZhaoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2018, title = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8653251/proceeding}, isbn = {978-1-7281-0155-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AlsulamiSDM17, author = {Bander Alsulami and Avinash Srinivasan and Hunter Dong and Spiros Mancoridis}, title = {Lightweight behavioral malware detection for windows platforms}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {75--81}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323959}, doi = {10.1109/MALWARE.2017.8323959}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AlsulamiSDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AnDNFWM17, author = {Ni An and Alexander M. Duff and Gaurav Naik and Michalis Faloutsos and Steven Weber and Spiros Mancoridis}, title = {Behavioral anomaly detection of malware on home routers}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323956}, doi = {10.1109/MALWARE.2017.8323956}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AnDNFWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Baumgartner17, author = {Kurt Baumgartner}, title = {"Attribution: The art and practice of answering the ancient question surrounding a crime - Who {DID} it?"}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323947}, doi = {10.1109/MALWARE.2017.8323947}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Baumgartner17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BonfanteGM17, author = {Guillaume Bonfante and Hubert Godfroy and Jean{-}Yves Marion}, title = {A construction of a self-modifiying language with a formal correction proof}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323962}, doi = {10.1109/MALWARE.2017.8323962}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CarliTMTJ17, author = {Lorenzo De Carli and Ruben Torres and Gaspar Modelo{-}Howard and Alok Tongaonkar and Somesh Jha}, title = {Kali: Scalable encryption fingerprinting in dynamic malware traces}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323951}, doi = {10.1109/MALWARE.2017.8323951}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CarliTMTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DawsonMSALH17, author = {Joel A. Dawson and Jeffrey Todd McDonald and Jordan Shropshire and Todd R. Andel and Patrick Luckett and Lee M. Hively}, title = {Rootkit detection through phase-space analysis of power voltage measurements}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {19--27}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323953}, doi = {10.1109/MALWARE.2017.8323953}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DawsonMSALH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HowardPDR17, author = {Michael Howard and Avi Pfeffer and Mukesh Dalai and Michael Reposa}, title = {Predicting signatures of future malware variants}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {126--132}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323965}, doi = {10.1109/MALWARE.2017.8323965}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HowardPDR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KogantiAJS17, author = {Venkata S. Koganti and Mohammad Ashrafuzzaman and Ananth A. Jillepalli and Frederick T. Sheldon}, title = {A virtual testbed for security management of industrial control systems}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {85--90}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323960}, doi = {10.1109/MALWARE.2017.8323960}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KogantiAJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LakhotiaB17, author = {Arun Lakhotia and Paul Black}, title = {Mining malware secrets}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323952}, doi = {10.1109/MALWARE.2017.8323952}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LakhotiaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LeslousTLG17, author = {Mourad Leslous and Val{\'{e}}rie Viet Triem Tong and Jean{-}Fran{\c{c}}ois Lalande and Thomas Genet}, title = {GPFinder: Tracking the invisible in Android malware}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323955}, doi = {10.1109/MALWARE.2017.8323955}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LeslousTLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MassarelliACQUB17, author = {Luca Massarelli and Leonardo Aniello and Claudio Ciccotelli and Leonardo Querzoni and Daniele Ucci and Roberto Baldoni}, title = {Android malware family classification based on resource consumption over time}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323954}, doi = {10.1109/MALWARE.2017.8323954}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MassarelliACQUB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Rrushi17, author = {Julian L. Rrushi}, title = {Phantom {I/O} projector: Entrapping malware on machines in production}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323957}, doi = {10.1109/MALWARE.2017.8323957}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Rrushi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ShanKFS17, author = {Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323958}, doi = {10.1109/MALWARE.2017.8323958}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ShanKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WenL17, author = {Yuejiang Wen and Yingjie Lao}, title = {Efficient fuzzy extractor implementations for {PUF} based authentication}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {119--125}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323964}, doi = {10.1109/MALWARE.2017.8323964}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/YuWBOBW17, author = {Lu Yu and Qing Wang and C. Geddings Barrineau and Jon Oakley and Richard R. Brooks and Kuang{-}Ching Wang}, title = {{TARN:} {A} SDN-based traffic analysis resistant network architecture}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323961}, doi = {10.1109/MALWARE.2017.8323961}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/YuWBOBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZakRN17, author = {Richard Zak and Edward Raff and Charles Nicholas}, title = {What can N-grams learn for malware detection?}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {109--118}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323963}, doi = {10.1109/MALWARE.2017.8323963}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZakRN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2017, title = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8318523/proceeding}, isbn = {978-1-5386-1436-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AnhND16, author = {Huynh Ngoc Anh and Wee Keong Ng and Hoang Giang Do}, title = {On periodic behavior of malware: experiments, opportunities and challenges}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {85--92}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888733}, doi = {10.1109/MALWARE.2016.7888733}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AnhND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BlackO16, author = {Paul Black and Joseph Opacki}, title = {Anti-analysis trends in banking malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {129--135}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888738}, doi = {10.1109/MALWARE.2016.7888738}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BlackO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CaseyS16, author = {William Casey and Aaron Shelmire}, title = {Signature limits: an entire map of clone features and their discovery in nearly linear time}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888740}, doi = {10.1109/MALWARE.2016.7888740}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CaseyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DamT16, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Automatic extraction of malicious behaviors}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {47--56}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888729}, doi = {10.1109/MALWARE.2016.7888729}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DamT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FuJYZB16, author = {Yu Fu and Zhe Jia and Lu Yu and Xingsi Zhong and Richard R. Brooks}, title = {A covert data transport protocol}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {93--100}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888734}, doi = {10.1109/MALWARE.2016.7888734}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FuJYZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/IqbalZ16, author = {Md. Shahrear Iqbal and Mohammad Zulkernine}, title = {Zonedroid: control your droid through application zoning}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888736}, doi = {10.1109/MALWARE.2016.7888736}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/IqbalZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JonesSC16, author = {Luke Jones and Andrew J. Sellers and Martin C. Carlisle}, title = {{CARDINAL:} similarity analysis to defeat malware compiler variations}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888728}, doi = {10.1109/MALWARE.2016.7888728}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JonesSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KarbabDAM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Saed Alrabaee and Djedjiga Mouheb}, title = {DySign: dynamic fingerprinting for the automatic detection of android malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888739}, doi = {10.1109/MALWARE.2016.7888739}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KitanaTW16, author = {Asem Kitana and Issa Traor{\'{e}} and Isaac Woungang}, title = {Impact of base transceiver station selection mechanisms on a mobile botnet over a {LTE} network}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {20--30}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888726}, doi = {10.1109/MALWARE.2016.7888726}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KitanaTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Korczynski16, author = {David Korczynski}, title = {RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888727}, doi = {10.1109/MALWARE.2016.7888727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Korczynski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KyweLHY16, author = {Su Mon Kywe and Yingjiu Li and Jason I. Hong and Cheng Yao}, title = {Dissecting developer policy violating apps: characterization and detection}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {10--19}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888725}, doi = {10.1109/MALWARE.2016.7888725}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KyweLHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Morales-OrtegaE16, author = {Salvador Morales{-}Ortega and Ponciano Jorge Escamilla{-}Ambrosio and Abraham Rodriguez{-}Mota and Lilian D. Coronado{-}De{-}Alba}, title = {Native malware detection in smartphones with android {OS} using static analysis, feature selection and ensemble classifiers}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888731}, doi = {10.1109/MALWARE.2016.7888731}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Morales-OrtegaE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Osorio16, author = {Fernando C. Col{\'{o}}n Osorio}, title = {Message from the general program chair}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888718}, doi = {10.1109/MALWARE.2016.7888718}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Osorio16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PingAM16, author = {Matthew Ping and Bander Alsulami and Spiros Mancoridis}, title = {On the effectiveness of application characteristics in the automatic classification of malware on smartphones}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888732}, doi = {10.1109/MALWARE.2016.7888732}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PingAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/RazoAE16, author = {Sergio Ivan Vargas Razo and Eleazar Aguirre Anaya and Ponciano Jorge Escamilla{-}Ambrosio}, title = {Reverse engineering with bioinformatics algorithms over a sound android covert channel}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {3--9}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888724}, doi = {10.1109/MALWARE.2016.7888724}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/RazoAE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SunLYSP16, author = {Lichao Sun and Zhiqiang Li and Qiben Yan and Witawas Srisa{-}an and Yu Pan}, title = {SigPID: significant permission identification for android malware detection}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888730}, doi = {10.1109/MALWARE.2016.7888730}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/SunLYSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TroiaVAS16, author = {Fabio Di Troia and Corrado Aaron Visaggio and Thomas H. Austin and Mark Stamp}, title = {Advanced transcriptase for JavaScript malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {121--128}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888737}, doi = {10.1109/MALWARE.2016.7888737}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TroiaVAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/UpchurchZ16, author = {Jason Upchurch and Xiaobo Zhou}, title = {Malware provenance: code reuse detection in malicious software at scale}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {101--109}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888735}, doi = {10.1109/MALWARE.2016.7888735}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/UpchurchZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Villegas16, author = {Angel M. Villegas}, title = {Function identification and recovery signature tool}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {157--164}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888741}, doi = {10.1109/MALWARE.2016.7888741}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Villegas16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Vitaliev16, author = {Dimitri Vitaliev}, title = {Keynote speaker}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888720}, doi = {10.1109/MALWARE.2016.7888720}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Vitaliev16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2016, title = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7884714/proceeding}, isbn = {978-1-5090-4542-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/0002ESS15, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou and Vincent Sritapan}, title = {Targeted DoS on android: how to disable android in 10 seconds or less}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413694}, doi = {10.1109/MALWARE.2015.7413694}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/0002ESS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AbrahamABLT15, author = {Adrien Abraham and Radoniaina Andriatsimandefitra and Adrien Brunelat and Jean{-}Fran{\c{c}}ois Lalande and Val{\'{e}}rie Viet Triem Tong}, title = {GroddDroid: a gorilla for triggering malicious behaviors}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {119--127}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413692}, doi = {10.1109/MALWARE.2015.7413692}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AbrahamABLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AresuAAMG15, author = {Marco Aresu and Davide Ariu and Mansour Ahmadi and Davide Maiorca and Giorgio Giacinto}, title = {Clustering android malware families by http traffic}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {128--135}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413693}, doi = {10.1109/MALWARE.2015.7413693}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AresuAAMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BanescuWSGOP15, author = {Sebastian Banescu and Tobias W{\"{u}}chner and Aleieldin Salem and Marius Guggenmos and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {A framework for empirical evaluation of malware detection resilience against behavior obfuscation}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {40--47}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413683}, doi = {10.1109/MALWARE.2015.7413683}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BanescuWSGOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BonfanteMS15, author = {Guillaume Bonfante and Jean{-}Yves Marion and Fabrice Sabatier}, title = {Gorille sniffs code similarities, the case study of qwerty versus regin}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {82--89}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413688}, doi = {10.1109/MALWARE.2015.7413688}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CanzaneseMK15, author = {Raymond Canzanese and Spiros Mancoridis and Moshe Kam}, title = {Run-time classification of malicious processes using system call analysis}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {21--28}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413681}, doi = {10.1109/MALWARE.2015.7413681}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CanzaneseMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GhoshMCM15, author = {Krishnendu Ghosh and Jose Andre Morales and William Casey and Bud Mishra}, title = {Sandboxing and reasoning on malware infection trees}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413686}, doi = {10.1109/MALWARE.2015.7413686}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GhoshMCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KerberTM15, author = {Florian Kerber and Dominik Teubert and Ulrike Meyer}, title = {Covert remote syscall communication at kernel level: {A} {SPOOKY} backdoor}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {74--81}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413687}, doi = {10.1109/MALWARE.2015.7413687}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KerberTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LeitoldHOG15, author = {Ferenc Leitold and Kalman Hadarics and Eszter Oroszi and Krisztina Gyorffy}, title = {Measuring the information security risk in an infrastructure}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {93--100}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413689}, doi = {10.1109/MALWARE.2015.7413689}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LeitoldHOG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LevesqueSBF15, author = {Fanny Lalonde L{\'{e}}vesque and Anil Somayaji and Dennis Batchelder and Jos{\'{e}} M. Fernandez}, title = {Measuring the health of antivirus ecosystems}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {101--109}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413690}, doi = {10.1109/MALWARE.2015.7413690}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LevesqueSBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LilleCRS15, author = {David De Lille and Bart Coppens and Daan Raman and Bjorn De Sutter}, title = {Automatically combining static malware detection techniques}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {48--55}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413684}, doi = {10.1109/MALWARE.2015.7413684}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LilleCRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OBrienL15, author = {John O'Brien and Kimmo Lehtonen}, title = {Counterfeit mobile devices - the duck test}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {144--151}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413695}, doi = {10.1109/MALWARE.2015.7413695}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OBrienL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OsorioQA15, author = {Fernando C. Col{\'{o}}n Osorio and Hongyuan Qiu and Anthony Arrott}, title = {Segmented sandboxing - {A} novel approach to Malware polymorphism detection}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {59--68}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413685}, doi = {10.1109/MALWARE.2015.7413685}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OsorioQA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Paxson15, author = {Vern Paxson}, title = {Keynote Speaker}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413676}, doi = {10.1109/MALWARE.2015.7413676}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Paxson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SaxeB15, author = {Joshua Saxe and Konstantin Berlin}, title = {Deep neural network based malware detection using two dimensional binary program features}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413680}, doi = {10.1109/MALWARE.2015.7413680}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SaxeB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/UpchurchZ15, author = {Jason Upchurch and Xiaobo Zhou}, title = {Variant: a malware similarity testing framework}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {31--39}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413682}, doi = {10.1109/MALWARE.2015.7413682}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/UpchurchZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WatkinsSMR15, author = {Lanier A. Watkins and Kurt Silberberg and Jose Andre Morales and William H. Robinson}, title = {Using inherent command and control vulnerabilities to halt DDoS attacks}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413679}, doi = {10.1109/MALWARE.2015.7413679}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WatkinsSMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZhongFYBV15, author = {Xingsi Zhong and Yu Fu and Lu Yu and Richard R. Brooks and Ganesh Kumar Venayagamoorthy}, title = {Stealthy malware traffic - Not as innocent as it looks}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {110--116}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413691}, doi = {10.1109/MALWARE.2015.7413691}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZhongFYBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2015, title = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7405773/proceeding}, isbn = {978-1-5090-0317-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BaraboschG14, author = {Thomas Barabosch and Elmar Gerhards{-}Padilla}, title = {Host-based code injection attacks: {A} popular technique used by malware}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {8--17}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999410}, doi = {10.1109/MALWARE.2014.6999410}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BaraboschG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CaseyWMAGM14, author = {William Casey and Evan Wright and Jose Andre Morales and Michael Appel and Jeff Gennari and Bud Mishra}, title = {Agent-based trace learning in a recommendation-verification system for cybersecurity}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {135--143}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999404}, doi = {10.1109/MALWARE.2014.6999404}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CaseyWMAGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ClementiSO14, author = {Andreas Clementi and Peter Stelzhammer and Fernando C. Col{\'{o}}n Osorio}, title = {Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {35--42}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999413}, doi = {10.1109/MALWARE.2014.6999413}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ClementiSO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DingXCXM14, author = {Wenbiao Ding and Xiao Xing and Ping Chen and Zhi Xin and Bing Mao}, title = {Automatic construction of printable return-oriented programming payload}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {18--25}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999408}, doi = {10.1109/MALWARE.2014.6999408}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DingXCXM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ElSheikhGGR14, author = {Muhammad H. ElSheikh and Mohammed S. Gadelrab and Mahmoud A. Ghoneim and Mohsen A. Rashwan}, title = {BoTGen: {A} new approach for in-lab generation of botnet datasets}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {76--84}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999406}, doi = {10.1109/MALWARE.2014.6999406}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ElSheikhGGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FioravantiF14, author = {Mark E. Fioravanti II and Richard Ford}, title = {Bacterial quorum sensing for coordination of targeted malware}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {101--108}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999405}, doi = {10.1109/MALWARE.2014.6999405}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FioravantiF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GassenC14, author = {Jan Gassen and Jonathan P. Chapman}, title = {HoneyAgent: Detecting malicious Java applets by using dynamic analysis}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {109--117}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999402}, doi = {10.1109/MALWARE.2014.6999402}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GassenC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GuriKKE14, author = {Mordechai Guri and Gabi Kedma and Assaf Kachlon and Yuval Elovici}, title = {AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999418}, doi = {10.1109/MALWARE.2014.6999418}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GuriKKE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JeongSLKLM14, author = {Jihwan Jeong and Dongwon Seo and Chanyoung Lee and Jonghoon Kwon and Heejo Lee and John Milburn}, title = {MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999415}, doi = {10.1109/MALWARE.2014.6999415}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/JeongSLKLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KwonKLLP14, author = {Jonghoon Kwon and Jeongsik Kim and Jehyun Lee and Heejo Lee and Adrian Perrig}, title = {PsyBoG: Power spectral density analysis for detecting botnet groups}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {85--92}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999414}, doi = {10.1109/MALWARE.2014.6999414}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KwonKLLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LeitoldAO14, author = {Ferenc Leitold and Anthony Arrott and Fernando C. Col{\'{o}}n Osorio}, title = {Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999407}, doi = {10.1109/MALWARE.2014.6999407}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LeitoldAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LevesqueFS14, author = {Fanny Lalonde L{\'{e}}vesque and Jos{\'{e}} M. Fernandez and Anil Somayaji}, title = {Risk prediction of malware victimization based on user behavior}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {128--134}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999412}, doi = {10.1109/MALWARE.2014.6999412}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LevesqueFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SaxeTB14, author = {Joshua Saxe and Rafael Turner and Kristina Blokhin}, title = {CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999417}, doi = {10.1109/MALWARE.2014.6999417}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SaxeTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SeidemanKV14, author = {Jeremy D. Seideman and Bilal Khan and Antonio Cesar Vargas}, title = {Identifying malware genera using the Jensen-Shannon distance between system call traces}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999409}, doi = {10.1109/MALWARE.2014.6999409}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SeidemanKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WatkinsKCR14, author = {Lanier A. Watkins and Christina Kawka and Cherita L. Corbett and William H. Robinson}, title = {Fighting banking botnets by exploiting inherent command and control vulnerabilities}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {93--100}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999411}, doi = {10.1109/MALWARE.2014.6999411}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WatkinsKCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WuAO14, author = {Jeffrey Wu and Anthony Arrott and Fernando C. Col{\'{o}}n Osorio}, title = {Protection against remote code execution exploits of popular applications in Windows}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {26--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999416}, doi = {10.1109/MALWARE.2014.6999416}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WuAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZwangerGM14, author = {Viviane Zwanger and Elmar Gerhards{-}Padilla and Michael Meier}, title = {Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files}, booktitle = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, pages = {118--127}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MALWARE.2014.6999403}, doi = {10.1109/MALWARE.2014.6999403}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZwangerGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2014, title = {9th International Conference on Malicious and Unwanted Software: The Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6987537/proceeding}, isbn = {978-1-4799-7328-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AdkinsJCU13, author = {Francis Adkins and Luke Jones and Martin C. Carlisle and Jason Upchurch}, title = {Heuristic malware detection via basic block comparison}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703680}, doi = {10.1109/MALWARE.2013.6703680}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AdkinsJCU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AndriesseRSPB13, author = {Dennis Andriesse and Christian Rossow and Brett Stone{-}Gross and Daniel Plohmann and Herbert Bos}, title = {Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {116--123}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703693}, doi = {10.1109/MALWARE.2013.6703693}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AndriesseRSPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Bat-ErdeneKLL13, author = {Munkhbayar Bat{-}Erdene and Taebeom Kim and Hongzhe Li and Heejo Lee}, title = {Dynamic classification of packing algorithms for inspecting executables using entropy analysis}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703681}, doi = {10.1109/MALWARE.2013.6703681}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Bat-ErdeneKLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BonfanteMST13, author = {Guillaume Bonfante and Jean{-}Yves Marion and Fabrice Sabatier and Aur{\'{e}}lien Thierry}, title = {Analysis and diversion of Duqu's driver}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {109--115}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703692}, doi = {10.1109/MALWARE.2013.6703692}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteMST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FedlerKS13, author = {Rafael Fedler and Marcel Kulicke and Julian Sch{\"{u}}tte}, title = {An antivirus {API} for Android malware recognition}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703688}, doi = {10.1109/MALWARE.2013.6703688}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FedlerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GuriKSCRE13, author = {Mordechai Guri and Gabi Kedma and Tom Sela and Buky Carmeli and Amit Rosner and Yuval Elovici}, title = {Noninvasive detection of anti-forensic malware}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703679}, doi = {10.1109/MALWARE.2013.6703679}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GuriKSCRE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JhaFCSY13, author = {Somesh Jha and Matthew Fredrikson and Mihai Christodorescu and Reiner Sailer and Xifeng Yan}, title = {Synthesizing near-optimal malware specifications from suspicious behaviors}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703684}, doi = {10.1109/MALWARE.2013.6703684}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LuCD13, author = {Gen Lu and Karan Chadha and Saumya K. Debray}, title = {A simple client-side defense against environment-dependent web-based malware}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {124--131}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703694}, doi = {10.1109/MALWARE.2013.6703694}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LuCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OsorioLMPMA13, author = {Fernando C. Col{\'{o}}n Osorio and Ferenc Leitold and Dorottya Mike and Chris Pickard and Sveta Miladinov and Anthony Arrott}, title = {Measuring the effectiveness of modern security products to detect and contain emerging threats - {A} consensus-based approach}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {27--34}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703682}, doi = {10.1109/MALWARE.2013.6703682}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OsorioLMPMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OuellettePL13, author = {Jacob Ouellette and Avi Pfeffer and Arun Lakhotia}, title = {Countering malware evolution using cloud-based learning}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703689}, doi = {10.1109/MALWARE.2013.6703689}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OuellettePL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ProtsenkoM13, author = {Mykola Protsenko and Tilo M{\"{u}}ller}, title = {{PANDORA} applies non-deterministic obfuscation randomly to Android}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {59--67}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703686}, doi = {10.1109/MALWARE.2013.6703686}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ProtsenkoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/QiuO13, author = {Hongyuan Qiu and Fernando C. Col{\'{o}}n Osorio}, title = {Static malware detection with Segmented Sandboxing}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {132--141}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703695}, doi = {10.1109/MALWARE.2013.6703695}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/QiuO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SapraHBS13, author = {Karan Sapra and Benafsh Husain and Richard R. Brooks and Melissa C. Smith}, title = {Circumventing keyloggers and screendumps}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {103--108}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703691}, doi = {10.1109/MALWARE.2013.6703691}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SapraHBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/UpchurchZ13, author = {Jason Upchurch and Xiaobo Zhou}, title = {First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {68--76}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703687}, doi = {10.1109/MALWARE.2013.6703687}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/UpchurchZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WhiteM13, author = {Joshua S. White and Jeanna N. Matthews}, title = {It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703685}, doi = {10.1109/MALWARE.2013.6703685}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WhiteM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WuA13, author = {Jeffrey Wu and Anthony Arrott}, title = {Use-case-specific metrics for comparative testing of endpoint security products}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {35--40}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703683}, doi = {10.1109/MALWARE.2013.6703683}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WuA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/YakdanEG13, author = {Khaled Yakdan and Sebastian Eschweiler and Elmar Gerhards{-}Padilla}, title = {REcompile: {A} decompilation framework for static analysis of binaries}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {95--102}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703690}, doi = {10.1109/MALWARE.2013.6703690}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/YakdanEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2013, title = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6693154/proceeding}, isbn = {978-1-4799-2534-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Al-BatainehW12, author = {Areej Al{-}Bataineh and Gregory White}, title = {Analysis and detection of malicious data exfiltration in web traffic}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {26--31}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461004}, doi = {10.1109/MALWARE.2012.6461004}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Al-BatainehW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AmamraTR12, author = {Abdelfattah Amamra and Chamseddine Talhi and Jean{-}Marc Robert}, title = {Smartphone malware detection: From a survey towards taxonomy}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {79--86}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461012}, doi = {10.1109/MALWARE.2012.6461012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AmamraTR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BlizardL12, author = {Tommy Blizard and Nikola Livic}, title = {Click-fraud monetizing malware: {A} survey and case study}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {67--72}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461010}, doi = {10.1109/MALWARE.2012.6461010}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BlizardL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BonfanteMST12, author = {Guillaume Bonfante and Jean{-}Yves Marion and Fabrice Sabatier and Aur{\'{e}}lien Thierry}, title = {Code synchronization by morphological analysis}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461016}, doi = {10.1109/MALWARE.2012.6461016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteMST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HayN12, author = {Brian Hay and Kara L. Nance}, title = {Circumventing cryptography in virtualized environments}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {32--38}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461005}, doi = {10.1109/MALWARE.2012.6461005}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HayN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HerpichBCA12, author = {Markus Herpich and Leonid Batyuk and Seyit Ahmet {\c{C}}amtepe and Sahin Albayrak}, title = {A trusted ecosystem for Android applications based on context-aware access control}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {73--78}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461011}, doi = {10.1109/MALWARE.2012.6461011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HerpichBCA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JinHCN12, author = {Wesley Jin and Charles Hines and Cory F. Cohen and Priya Narasimhan}, title = {A scalable search index for binary files}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {94--103}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461014}, doi = {10.1109/MALWARE.2012.6461014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JinHCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KwonL12, author = {Jonghoon Kwon and Heejo Lee}, title = {BinGraph: Discovering mutant malware using hierarchical semantic signatures}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {104--111}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461015}, doi = {10.1109/MALWARE.2012.6461015}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KwonL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LeitoldH12, author = {Ferenc Leitold and Kalman Hadarics}, title = {Measuring security risk in the cloud-enabled enterprise}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {62--66}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461009}, doi = {10.1109/MALWARE.2012.6461009}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LeitoldH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MarxDA12, author = {Andreas Marx and Alice Decker and Anthony Arrott}, title = {Component protection metrics for security product development: I. {AV-TEST} Full Product Tests}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {54--61}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461008}, doi = {10.1109/MALWARE.2012.6461008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MarxDA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MatenaarWLG12, author = {Felix Matenaar and Andr{\'{e}} Wichmann and Felix Leder and Elmar Gerhards{-}Padilla}, title = {{CIS:} The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {46--53}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461007}, doi = {10.1109/MALWARE.2012.6461007}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MatenaarWLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PfefferCCKOPZLGBHS12, author = {Avi Pfeffer and Catherine Call and John Chamberlain and Lee Kellogg and Jacob Ouellette and Terry Patten and Greg Zacharias and Arun Lakhotia and Suresh Golconda and John Bay and Robert Hall and Daniel Scofield}, title = {Malware Analysis and attribution using Genetic Information}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {39--45}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461006}, doi = {10.1109/MALWARE.2012.6461006}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PfefferCCKOPZLGBHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PickardM12, author = {Chris Pickard and Sveta Miladinov}, title = {Rogue software: Protection against potentially unwanted applications}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461001}, doi = {10.1109/MALWARE.2012.6461001}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PickardM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SpauldingKS12, author = {John Spaulding and Alyssa Krauss and Avinash Srinivasan}, title = {Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {87--93}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461013}, doi = {10.1109/MALWARE.2012.6461013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SpauldingKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WalensteinL12, author = {Andrew Walenstein and Arun Lakhotia}, title = {A transformation-based model of malware derivation}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {17--25}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461003}, doi = {10.1109/MALWARE.2012.6461003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WalensteinL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/XuZZ12, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, title = {The power of obfuscation techniques in malicious JavaScript code: {A} measurement study}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461002}, doi = {10.1109/MALWARE.2012.6461002}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/XuZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZhaoO12, author = {Zhibo Zhao and Fernando C. Col{\'{o}}n Osorio}, title = {"TrustDroid{\texttrademark}": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking}, booktitle = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, pages = {135--143}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MALWARE.2012.6461017}, doi = {10.1109/MALWARE.2012.6461017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZhaoO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2012, title = {7th International Conference on Malicious and Unwanted Software, {MALWARE} 2012, Fajardo, PR, USA, October 16-18, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6449416/proceeding}, isbn = {978-1-4673-4880-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BalanzaAADC11, author = {Mark Balanza and Kervin Alintanahin and Oscar Abendan and Julius Dizon and Bernadette Caraig}, title = {DroidDreamLight lurks behind legitimate Android apps}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {73--78}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112329}, doi = {10.1109/MALWARE.2011.6112329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BalanzaAADC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BatyukHCRSA11, author = {Leonid Batyuk and Markus Herpich and Seyit Ahmet {\c{C}}amtepe and Karsten Raddatz and Aubrey{-}Derrick Schmidt and Sahin Albayrak}, title = {Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {66--72}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112328}, doi = {10.1109/MALWARE.2011.6112328}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BatyukHCRSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BishopFR11, author = {Matt Bishop and Richard Ford and Marco Ramilli}, title = {Results-oriented security}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {42--49}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112325}, doi = {10.1109/MALWARE.2011.6112325}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BishopFR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BrancoB11, author = {Rodrigo Rubira Branco and Gabriel Negreira Barbosa}, title = {Distributed malware analysis scheduling}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112324}, doi = {10.1109/MALWARE.2011.6112324}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BrancoB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Gonzalez-RobledoNN11, author = {Hugo Gonzalez{-}Robledo and Kara Nance and Jose Nazario}, title = {Phishing by form: The abuse of form sites}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {95--101}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112332}, doi = {10.1109/MALWARE.2011.6112332}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Gonzalez-RobledoNN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Leitold11, author = {Ferenc Leitold}, title = {Testing protections against web threats}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {20--26}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112322}, doi = {10.1109/MALWARE.2011.6112322}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Leitold11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LiLD11, author = {Frankie Li and Anthony Lai and DDL}, title = {Evidence of Advanced Persistent Threat: {A} case study of malware for political espionage}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112333}, doi = {10.1109/MALWARE.2011.6112333}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LiLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LiuLZLC11, author = {Chaoge Liu and Weiqing Lu and Zhiqi Zhang and Peng Liao and Xiang Cui}, title = {A recoverable hybrid C{\&}C botnet}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {110--118}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112334}, doi = {10.1109/MALWARE.2011.6112334}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LiuLZLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Lugo-CorderoGLR11, author = {Hector M. Lugo{-}Cordero and Ratan K. Guha and Kejie Lu and Domingo Rodr{\'{\i}}guez}, title = {Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {88--94}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112331}, doi = {10.1109/MALWARE.2011.6112331}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Lugo-CorderoGLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MoralesMLXS11, author = {Jose Andre Morales and Michael Main and Weiliang Luo and Shouhuai Xu and Ravi S. Sandhu}, title = {Building malware infection trees}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112326}, doi = {10.1109/MALWARE.2011.6112326}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MoralesMLXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PhatakM11, author = {Vikram Phatak and Rick Moy}, title = {Evaluating security products based on appropriate usage}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {27--33}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112323}, doi = {10.1109/MALWARE.2011.6112323}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PhatakM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PolychronakisK11, author = {Michalis Polychronakis and Angelos D. Keromytis}, title = {{ROP} payload detection using speculative code execution}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112327}, doi = {10.1109/MALWARE.2011.6112327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PolychronakisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/RamilliBS11, author = {Marco Ramilli and Matt Bishop and Shining Sun}, title = {Multiprocess malware}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {8--13}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112320}, doi = {10.1109/MALWARE.2011.6112320}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/RamilliBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SinghL11, author = {Anshuman Singh and Arun Lakhotia}, title = {Game-theoretic design of an information exchange model for detecting packed malware}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112319}, doi = {10.1109/MALWARE.2011.6112319}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SinghL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/StakhanovaCG11, author = {Natalia Stakhanova and Mathieu Couture and Ali A. Ghorbani}, title = {Exploring network-based malware classification}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {14--20}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112321}, doi = {10.1109/MALWARE.2011.6112321}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/StakhanovaCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/YouN11, author = {Dong{-}Hoon You and Bong{-}Nam Noh}, title = {Android platform based linux kernel rootkit}, booktitle = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, pages = {79--87}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MALWARE.2011.6112330}, doi = {10.1109/MALWARE.2011.6112330}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/YouN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2011, title = {6th International Conference on Malicious and Unwanted Software, {MALWARE} 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6104282/proceeding}, isbn = {978-1-4673-0033-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BlasingBSCA10, author = {Thomas Bl{\"{a}}sing and Leonid Batyuk and Aubrey{-}Derrick Schmidt and Seyit Ahmet {\c{C}}amtepe and Sahin Albayrak}, title = {An Android Application Sandbox system for suspicious software detection}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {55--62}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665792}, doi = {10.1109/MALWARE.2010.5665792}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BlasingBSCA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BrancoS10, author = {Rodrigo Rubira Branco and Udi Shamir}, title = {Architecture for automation of malware analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {106--112}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665786}, doi = {10.1109/MALWARE.2010.5665786}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BrancoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GnaedigKRW10, author = {Isabelle Gnaedig and Matthieu Kaczmarek and Daniel Reynaud and St{\'{e}}phane Wloka}, title = {Unconditional self-modifying code elimination with dynamic compiler optimizations}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665795}, doi = {10.1109/MALWARE.2010.5665795}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GnaedigKRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JeongCLBL10, author = {Guhyeon Jeong and Euijin Choo and Joosuk Lee and Munkhbayar Bat{-}Erdene and Heejo Lee}, title = {Generic unpacking using entropy analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665789}, doi = {10.1109/MALWARE.2010.5665789}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JeongCLBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KawakoyaII10, author = {Yuhei Kawakoya and Makoto Iwamura and Mitsutaka Itoh}, title = {Memory behavior-based automatic malware unpacking in stealth debugging environment}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665794}, doi = {10.1109/MALWARE.2010.5665794}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KawakoyaII10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MoralesSX10, author = {Jose Andre Morales and Ravi S. Sandhu and Shouhuai Xu}, title = {Evaluating detection and treatment effectiveness of commercial anti-malware programs}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665797}, doi = {10.1109/MALWARE.2010.5665797}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MoralesSX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MullinerS10, author = {Collin Mulliner and Jean{-}Pierre Seifert}, title = {Rise of the iBots: Owning a telco network}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {71--80}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665790}, doi = {10.1109/MALWARE.2010.5665790}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MullinerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OsorioP10, author = {Fernando C. Col{\'{o}}n Osorio and Frank S. Posluszny}, title = {Overcoming the limitations in computer worm models}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {81--90}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665791}, doi = {10.1109/MALWARE.2010.5665791}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OsorioP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/RamilliB10, author = {Marco Ramilli and Matt Bishop}, title = {Multi-stage delivery of malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {91--97}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665788}, doi = {10.1109/MALWARE.2010.5665788}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/RamilliB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SangLND10, author = {Fernand Lone Sang and {\'{E}}ric Lacombe and Vincent Nicomette and Yves Deswarte}, title = {Exploiting an {I/OMMU} vulnerability}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {7--14}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665798}, doi = {10.1109/MALWARE.2010.5665798}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SangLND10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ShangZXXZ10, author = {Shanhu Shang and Ning Zheng and Jian Xu and Ming Xu and Haiping Zhang}, title = {Detecting malware variants via function-call graph similarity}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665787}, doi = {10.1109/MALWARE.2010.5665787}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ShangZXXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ThomasN10, author = {Kurt Thomas and David M. Nicol}, title = {The Koobface botnet and the rise of social malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {63--70}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665793}, doi = {10.1109/MALWARE.2010.5665793}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ThomasN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TianIBV10, author = {Ronghua Tian and Md. Rafiqul Islam and Lynn Margaret Batten and Steven Versteeg}, title = {Differentiating malware from cleanware using behavioural analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {23--30}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665796}, doi = {10.1109/MALWARE.2010.5665796}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TianIBV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/VasiliadisPI10, author = {Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis}, title = {GPU-assisted malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665801}, doi = {10.1109/MALWARE.2010.5665801}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/VasiliadisPI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WalensteinHW10, author = {Andrew Walenstein and Daniel J. Hefner and Jeffery Wichers}, title = {Header information in malware families and impact on automated classifiers}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665799}, doi = {10.1109/MALWARE.2010.5665799}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WalensteinHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2010, title = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5655114/proceeding}, isbn = {978-1-4244-9355-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CalvetDB09, author = {Joan Calvet and Carlton R. Davis and Pierre{-}Marc Bureau}, title = {Malware authors don't learn, and that's good!}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {88--97}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403013}, doi = {10.1109/MALWARE.2009.5403013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CalvetDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DavisFN09, author = {Carlton R. Davis and Jos{\'{e}} M. Fernandez and Stephen Neville}, title = {Optimising sybil attacks against P2P-based botnets}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {78--87}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403016}, doi = {10.1109/MALWARE.2009.5403016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DavisFN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FaghaniS09, author = {Mohammad Reza Faghani and Hossein Saidi}, title = {Malware propagation in Online Social Networks}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {8--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403023}, doi = {10.1109/MALWARE.2009.5403023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FaghaniS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GuizaniMR09, author = {Wadie Guizani and Jean{-}Yves Marion and Daniel Reynaud{-}Plantey}, title = {Server-side dynamic code analysis}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {55--62}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403017}, doi = {10.1109/MALWARE.2009.5403017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GuizaniMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LederSM09, author = {Felix Leder and Bastian Steinbock and Peter Martini}, title = {Classification and detection of metamorphic malware using value set analysis}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403019}, doi = {10.1109/MALWARE.2009.5403019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LederSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LikarishJJ09, author = {Peter Likarish and Eunjin Jung and Insoon Jo}, title = {Obfuscated malicious javascript detection using classification techniques}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403020}, doi = {10.1109/MALWARE.2009.5403020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LikarishJJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MoralesAXS09, author = {Jose Andre Morales and Areej Al{-}Bataineh and Shouhuai Xu and Ravi S. Sandhu}, title = {Analyzing {DNS} activities of bot processes}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {98--103}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403014}, doi = {10.1109/MALWARE.2009.5403014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MoralesAXS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SchmidtCCA09, author = {Aubrey{-}Derrick Schmidt and Jan Hendrik Clausen and Seyit Ahmet {\c{C}}amtepe and Sahin Albayrak}, title = {Detecting Symbian {OS} malware through static function call analysis}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403024}, doi = {10.1109/MALWARE.2009.5403024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SchmidtCCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SchmidtSBCCAY09, author = {Aubrey{-}Derrick Schmidt and Hans{-}Gunther Schmidt and Leonid Batyuk and Jan Hendrik Clausen and Seyit Ahmet {\c{C}}amtepe and Sahin Albayrak and Can Yildizli}, title = {Smartphone malware evolution revisited: Android next target?}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403026}, doi = {10.1109/MALWARE.2009.5403026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SchmidtSBCCAY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SinclairNK09, author = {Greg Sinclair and Chris Nunnery and Brent ByungHoon Kang}, title = {The waledac protocol: The how and why}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {69--77}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403015}, doi = {10.1109/MALWARE.2009.5403015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SinclairNK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TianBIV09, author = {Ronghua Tian and Lynn Margaret Batten and Md. Rafiqul Islam and Steven Versteeg}, title = {An automated classification system based on the strings of trojan and virus families}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {23--30}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403021}, doi = {10.1109/MALWARE.2009.5403021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TianBIV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WagnerWSE09, author = {Cynthia Wagner and G{\'{e}}rard Wagener and Radu State and Thomas Engel}, title = {Malware analysis with graph kernels and support vector machines}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {63--68}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403018}, doi = {10.1109/MALWARE.2009.5403018}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WagnerWSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WernerFGM09, author = {Tillmann Werner and Christoph Fuchs and Elmar Gerhards{-}Padilla and Peter Martini}, title = {Nebula - generating syntactical network intrusion signatures}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403022}, doi = {10.1109/MALWARE.2009.5403022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WernerFGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2009, title = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5392747/proceeding}, isbn = {978-1-4244-5787-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BonfanteKM08, author = {Guillaume Bonfante and Matthieu Kaczmarek and Jean{-}Yves Marion}, title = {Morphological detection of malware}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690851}, doi = {10.1109/MALWARE.2008.4690851}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ChouchaneWL08, author = {Mohamed R. Chouchane and Andrew Walenstein and Arun Lakhotia}, title = {Using Markov chains to filter machine-morphed variants of malicious programs}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690861}, doi = {10.1109/MALWARE.2008.4690861}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ChouchaneWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Craioveanu08, author = {Cristian Craioveanu}, title = {Server-side script polumorphism: Techniques of analysis and defense}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690852}, doi = {10.1109/MALWARE.2008.4690852}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Craioveanu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DavisFNM08, author = {Carlton R. Davis and Jos{\'{e}} M. Fernandez and Stephen Neville and John McHugh}, title = {Sybil attacks as a mitigation strategy against the Storm botnet}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {32--40}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690855}, doi = {10.1109/MALWARE.2008.4690855}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DavisFNM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DittrichD08, author = {David Dittrich and Sven Dietrich}, title = {{P2P} as botnet command and control: {A} deeper insight}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {41--48}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690856}, doi = {10.1109/MALWARE.2008.4690856}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DittrichD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HarleyB08, author = {David Harley and Pierre{-}Marc Bureau}, title = {Drive-by downloads from the trenches}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {98--103}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690864}, doi = {10.1109/MALWARE.2008.4690864}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HarleyB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LevyPK08, author = {Jamie Levy and Jaroslaw Paduch and Bilal Khan}, title = {Superimposing permutational covert channels onto reliable stream protocols}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {49--56}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690857}, doi = {10.1109/MALWARE.2008.4690857}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LevyPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/NazarioH08, author = {Jose Nazario and Thorsten Holz}, title = {As the net churns: Fast-flux botnet observations}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690854}, doi = {10.1109/MALWARE.2008.4690854}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/NazarioH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/NielsonCA08, author = {Jordan Nielson and Daniel Medeiros Nunes de Castro and John Aycock}, title = {Image spam - {ASCII} to the rescue!}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {65--68}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690859}, doi = {10.1109/MALWARE.2008.4690859}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/NielsonCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Osorio08, author = {Fernando C. Col{\'{o}}n Osorio}, title = {State of wireless security implementations in the United States and Europe - empirical data}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {92--97}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690863}, doi = {10.1109/MALWARE.2008.4690863}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Osorio08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SinhaBJ08, author = {Sushant Sinha and Michael D. Bailey and Farnam Jahanian}, title = {Shades of grey: On the effectiveness of reputation-based "blacklists"}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {57--64}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690858}, doi = {10.1109/MALWARE.2008.4690858}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SinhaBJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SunEB08, author = {Li Sun and Tim Ebringer and S. Boztag}, title = {An automatic anti-anti-VMware technique applicable for multi-stage packed malware}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690853}, doi = {10.1109/MALWARE.2008.4690853}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SunEB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ThomasJ08, author = {Vinoo Thomas and Nitin Jyoti}, title = {Combating file infectors on corporate networks}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {85--91}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690862}, doi = {10.1109/MALWARE.2008.4690862}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ThomasJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TianBV08, author = {Ronghua Tian and Lynn Margaret Batten and Steven Versteeg}, title = {Function length as a tool for malware classification}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690860}, doi = {10.1109/MALWARE.2008.4690860}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TianBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2008, title = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4686744/proceeding}, isbn = {978-1-4244-3288-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.