Search dblp for Publications

export results for "stream:streams/conf/malware:"

 download as .bib file

@inproceedings{DBLP:conf/malware/AlsulamiM18,
  author       = {Bander Alsulami and
                  Spiros Mancoridis},
  title        = {Behavioral Malware Classification using Convolutional Recurrent Neural
                  Networks},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {103--111},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659358},
  doi          = {10.1109/MALWARE.2018.8659358},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/AlsulamiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AnDNWM18,
  author       = {Ni An and
                  Alexander M. Duff and
                  Mahshid Noorani and
                  Steven Weber and
                  Spiros Mancoridis},
  title        = {Malware Anomaly Detection on Virtual Assistants},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {124--131},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659366},
  doi          = {10.1109/MALWARE.2018.8659366},
  timestamp    = {Mon, 04 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AnDNWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FleshmanRZMN18,
  author       = {William Fleshman and
                  Edward Raff and
                  Richard Zak and
                  Mark McLean and
                  Charles Nicholas},
  title        = {Static Malware Detection {\&} Subterfuge: Quantifying the Robustness
                  of Machine Learning and Current Anti-Virus},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {3--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659360},
  doi          = {10.1109/MALWARE.2018.8659360},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FleshmanRZMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HechtSE18,
  author       = {Asaf Hecht and
                  Adi Sagi and
                  Yuval Elovici},
  title        = {{PIDS:} {A} Behavioral Framework for Analysis and Detection of Network
                  Printer Attacks},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {87--94},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659371},
  doi          = {10.1109/MALWARE.2018.8659371},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HechtSE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/IqbalZ18,
  author       = {Shahrear Iqbal and
                  Mohammad Zulkernine},
  title        = {SpyDroid: {A} Framework for Employing Multiple Real-Time Malware Detectors
                  on Android},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659365},
  doi          = {10.1109/MALWARE.2018.8659365},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/IqbalZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JillepalliLJCOA18,
  author       = {Ananth A. Jillepalli and
                  Daniel Conte de Leon and
                  Brian K. Johnson and
                  Yacine Chakhchoukh and
                  Ibukun A. Oyewumi and
                  Mohammad Ashrafuzzaman and
                  Frederick T. Sheldon and
                  Jim Alves{-}Foss and
                  Michael A. Haney},
  title        = {{METICS:} {A} Holistic Cyber Physical System Model for {IEEE} 14-bus
                  Power System Security},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {95--102},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659367},
  doi          = {10.1109/MALWARE.2018.8659367},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/JillepalliLJCOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KesidisSFSK18,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Daniel Fleck and
                  Angelos Stavrou and
                  Takis Konstantopoulos},
  title        = {An adversarial coupon-collector model of asynchronous moving-target
                  defense against botnet reconnaissance\({}^{\mbox{*}}\)},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659359},
  doi          = {10.1109/MALWARE.2018.8659359},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KimMMB18,
  author       = {Danny Kim and
                  Daniel Mirsky and
                  Amir Majlesi{-}Kupaei and
                  Rajeev Barua},
  title        = {A Hybrid Static Tool to Increase the Usability and Scalability of
                  Dynamic Detection of Malware},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {115--123},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659373},
  doi          = {10.1109/MALWARE.2018.8659373},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KimMMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KleinBCBR18,
  author       = {Rory Klein and
                  Tyler Barkley and
                  Weston Clizbe and
                  Jennifer Bateman and
                  Julian L. Rrushi},
  title        = {Model-driven Timing Consistency for Active Malware Redirection},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {132--141},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659370},
  doi          = {10.1109/MALWARE.2018.8659370},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KleinBCBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LemayL18,
  author       = {Antoine Lemay and
                  Sylvain P. Leblanc},
  title        = {Is eval {()} Evil : {A} study of JavaScript in {PDF} malware},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {13--22},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659374},
  doi          = {10.1109/MALWARE.2018.8659374},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/LemayL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MedinaNCP18,
  author       = {Ramon P. Medina and
                  Elijah B. Neundorfer and
                  Radhouane Chouchane and
                  Alfredo J. Perez},
  title        = {{PRAST:} Using Logic Bombs to Exploit the Android Permission Model
                  and a Module Based Solution},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659369},
  doi          = {10.1109/MALWARE.2018.8659369},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/MedinaNCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MedurySB018,
  author       = {Sai Medury and
                  Anthony Skjellum and
                  Richard R. Brooks and
                  Lu Yu},
  title        = {SCRaaPS: {X.509} Certificate Revocation Using the Blockchain-based
                  Scrybe Secure Provenance System},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {145--152},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659364},
  doi          = {10.1109/MALWARE.2018.8659364},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/MedurySB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MichaudDL18,
  author       = {Michael James Michaud and
                  Thomas R. Dean and
                  Sylvain P. Leblanc},
  title        = {Attacking {OMG} Data Distribution Service {(DDS)} Based Real-Time
                  Mission Critical Distributed Systems},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {68--77},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659368},
  doi          = {10.1109/MALWARE.2018.8659368},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/MichaudDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OakleyW0BS18,
  author       = {Jonathan Oakley and
                  Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Anthony Skjellum},
  title        = {Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659357},
  doi          = {10.1109/MALWARE.2018.8659357},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/OakleyW0BS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ParkerMJB18,
  author       = {Colby Parker and
                  Jeffrey Todd McDonald and
                  Tom Johnsten and
                  Ryan G. Benton},
  title        = {Android Malware Detection Using Step-Size Based Multi-layered Vector
                  Space Models},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {49--58},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659372},
  doi          = {10.1109/MALWARE.2018.8659372},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/ParkerMJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PietAM18,
  author       = {Julien Piet and
                  Blake Anderson and
                  David A. McGrew},
  title        = {An In-Depth Study of Open-Source Command and Control Frameworks},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659361},
  doi          = {10.1109/MALWARE.2018.8659361},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/PietAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WangZJT18,
  author       = {Chang Wang and
                  Zhaolong Zhang and
                  Xiaoqi Jia and
                  Donghai Tian},
  title        = {Binary Obfuscation Based Reassemble},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {153--160},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659363},
  doi          = {10.1109/MALWARE.2018.8659363},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WangZJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZhaoL18,
  author       = {Bingyin Zhao and
                  Yingjie Lao},
  title        = {Resilience of Pruned Neural Network Against Poisoning Attack},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {78--83},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659362},
  doi          = {10.1109/MALWARE.2018.8659362},
  timestamp    = {Sat, 09 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZhaoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2018,
  title        = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8653251/proceeding},
  isbn         = {978-1-7281-0155-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AlsulamiSDM17,
  author       = {Bander Alsulami and
                  Avinash Srinivasan and
                  Hunter Dong and
                  Spiros Mancoridis},
  title        = {Lightweight behavioral malware detection for windows platforms},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {75--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323959},
  doi          = {10.1109/MALWARE.2017.8323959},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AlsulamiSDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AnDNFWM17,
  author       = {Ni An and
                  Alexander M. Duff and
                  Gaurav Naik and
                  Michalis Faloutsos and
                  Steven Weber and
                  Spiros Mancoridis},
  title        = {Behavioral anomaly detection of malware on home routers},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {47--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323956},
  doi          = {10.1109/MALWARE.2017.8323956},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AnDNFWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Baumgartner17,
  author       = {Kurt Baumgartner},
  title        = {"Attribution: The art and practice of answering the ancient question
                  surrounding a crime - Who {DID} it?"},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323947},
  doi          = {10.1109/MALWARE.2017.8323947},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Baumgartner17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteGM17,
  author       = {Guillaume Bonfante and
                  Hubert Godfroy and
                  Jean{-}Yves Marion},
  title        = {A construction of a self-modifiying language with a formal correction
                  proof},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323962},
  doi          = {10.1109/MALWARE.2017.8323962},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CarliTMTJ17,
  author       = {Lorenzo De Carli and
                  Ruben Torres and
                  Gaspar Modelo{-}Howard and
                  Alok Tongaonkar and
                  Somesh Jha},
  title        = {Kali: Scalable encryption fingerprinting in dynamic malware traces},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323951},
  doi          = {10.1109/MALWARE.2017.8323951},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CarliTMTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DawsonMSALH17,
  author       = {Joel A. Dawson and
                  Jeffrey Todd McDonald and
                  Jordan Shropshire and
                  Todd R. Andel and
                  Patrick Luckett and
                  Lee M. Hively},
  title        = {Rootkit detection through phase-space analysis of power voltage measurements},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {19--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323953},
  doi          = {10.1109/MALWARE.2017.8323953},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DawsonMSALH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HowardPDR17,
  author       = {Michael Howard and
                  Avi Pfeffer and
                  Mukesh Dalai and
                  Michael Reposa},
  title        = {Predicting signatures of future malware variants},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {126--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323965},
  doi          = {10.1109/MALWARE.2017.8323965},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HowardPDR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KogantiAJS17,
  author       = {Venkata S. Koganti and
                  Mohammad Ashrafuzzaman and
                  Ananth A. Jillepalli and
                  Frederick T. Sheldon},
  title        = {A virtual testbed for security management of industrial control systems},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {85--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323960},
  doi          = {10.1109/MALWARE.2017.8323960},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KogantiAJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LakhotiaB17,
  author       = {Arun Lakhotia and
                  Paul Black},
  title        = {Mining malware secrets},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323952},
  doi          = {10.1109/MALWARE.2017.8323952},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LakhotiaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LeslousTLG17,
  author       = {Mourad Leslous and
                  Val{\'{e}}rie Viet Triem Tong and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Thomas Genet},
  title        = {GPFinder: Tracking the invisible in Android malware},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323955},
  doi          = {10.1109/MALWARE.2017.8323955},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LeslousTLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MassarelliACQUB17,
  author       = {Luca Massarelli and
                  Leonardo Aniello and
                  Claudio Ciccotelli and
                  Leonardo Querzoni and
                  Daniele Ucci and
                  Roberto Baldoni},
  title        = {Android malware family classification based on resource consumption
                  over time},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323954},
  doi          = {10.1109/MALWARE.2017.8323954},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MassarelliACQUB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Rrushi17,
  author       = {Julian L. Rrushi},
  title        = {Phantom {I/O} projector: Entrapping malware on machines in production},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323957},
  doi          = {10.1109/MALWARE.2017.8323957},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Rrushi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ShanKFS17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Preliminary study of fission defenses against low-volume DoS attacks
                  on proxied multiserver systems},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323958},
  doi          = {10.1109/MALWARE.2017.8323958},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ShanKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WenL17,
  author       = {Yuejiang Wen and
                  Yingjie Lao},
  title        = {Efficient fuzzy extractor implementations for {PUF} based authentication},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {119--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323964},
  doi          = {10.1109/MALWARE.2017.8323964},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/YuWBOBW17,
  author       = {Lu Yu and
                  Qing Wang and
                  C. Geddings Barrineau and
                  Jon Oakley and
                  Richard R. Brooks and
                  Kuang{-}Ching Wang},
  title        = {{TARN:} {A} SDN-based traffic analysis resistant network architecture},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323961},
  doi          = {10.1109/MALWARE.2017.8323961},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/YuWBOBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZakRN17,
  author       = {Richard Zak and
                  Edward Raff and
                  Charles Nicholas},
  title        = {What can N-grams learn for malware detection?},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323963},
  doi          = {10.1109/MALWARE.2017.8323963},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZakRN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2017,
  title        = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8318523/proceeding},
  isbn         = {978-1-5386-1436-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AnhND16,
  author       = {Huynh Ngoc Anh and
                  Wee Keong Ng and
                  Hoang Giang Do},
  title        = {On periodic behavior of malware: experiments, opportunities and challenges},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888733},
  doi          = {10.1109/MALWARE.2016.7888733},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AnhND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BlackO16,
  author       = {Paul Black and
                  Joseph Opacki},
  title        = {Anti-analysis trends in banking malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {129--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888738},
  doi          = {10.1109/MALWARE.2016.7888738},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BlackO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CaseyS16,
  author       = {William Casey and
                  Aaron Shelmire},
  title        = {Signature limits: an entire map of clone features and their discovery
                  in nearly linear time},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {147--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888740},
  doi          = {10.1109/MALWARE.2016.7888740},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CaseyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DamT16,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {Automatic extraction of malicious behaviors},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {47--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888729},
  doi          = {10.1109/MALWARE.2016.7888729},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DamT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FuJYZB16,
  author       = {Yu Fu and
                  Zhe Jia and
                  Lu Yu and
                  Xingsi Zhong and
                  Richard R. Brooks},
  title        = {A covert data transport protocol},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888734},
  doi          = {10.1109/MALWARE.2016.7888734},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FuJYZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/IqbalZ16,
  author       = {Md. Shahrear Iqbal and
                  Mohammad Zulkernine},
  title        = {Zonedroid: control your droid through application zoning},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888736},
  doi          = {10.1109/MALWARE.2016.7888736},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/IqbalZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JonesSC16,
  author       = {Luke Jones and
                  Andrew J. Sellers and
                  Martin C. Carlisle},
  title        = {{CARDINAL:} similarity analysis to defeat malware compiler variations},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888728},
  doi          = {10.1109/MALWARE.2016.7888728},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JonesSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KarbabDAM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  title        = {DySign: dynamic fingerprinting for the automatic detection of android
                  malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888739},
  doi          = {10.1109/MALWARE.2016.7888739},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KitanaTW16,
  author       = {Asem Kitana and
                  Issa Traor{\'{e}} and
                  Isaac Woungang},
  title        = {Impact of base transceiver station selection mechanisms on a mobile
                  botnet over a {LTE} network},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {20--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888726},
  doi          = {10.1109/MALWARE.2016.7888726},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KitanaTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Korczynski16,
  author       = {David Korczynski},
  title        = {RePEconstruct: reconstructing binaries with self-modifying code and
                  import address table destruction},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888727},
  doi          = {10.1109/MALWARE.2016.7888727},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Korczynski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KyweLHY16,
  author       = {Su Mon Kywe and
                  Yingjiu Li and
                  Jason I. Hong and
                  Cheng Yao},
  title        = {Dissecting developer policy violating apps: characterization and detection},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {10--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888725},
  doi          = {10.1109/MALWARE.2016.7888725},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KyweLHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Morales-OrtegaE16,
  author       = {Salvador Morales{-}Ortega and
                  Ponciano Jorge Escamilla{-}Ambrosio and
                  Abraham Rodriguez{-}Mota and
                  Lilian D. Coronado{-}De{-}Alba},
  title        = {Native malware detection in smartphones with android {OS} using static
                  analysis, feature selection and ensemble classifiers},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888731},
  doi          = {10.1109/MALWARE.2016.7888731},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Morales-OrtegaE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Osorio16,
  author       = {Fernando C. Col{\'{o}}n Osorio},
  title        = {Message from the general program chair},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888718},
  doi          = {10.1109/MALWARE.2016.7888718},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Osorio16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PingAM16,
  author       = {Matthew Ping and
                  Bander Alsulami and
                  Spiros Mancoridis},
  title        = {On the effectiveness of application characteristics in the automatic
                  classification of malware on smartphones},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888732},
  doi          = {10.1109/MALWARE.2016.7888732},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PingAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/RazoAE16,
  author       = {Sergio Ivan Vargas Razo and
                  Eleazar Aguirre Anaya and
                  Ponciano Jorge Escamilla{-}Ambrosio},
  title        = {Reverse engineering with bioinformatics algorithms over a sound android
                  covert channel},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {3--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888724},
  doi          = {10.1109/MALWARE.2016.7888724},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/RazoAE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SunLYSP16,
  author       = {Lichao Sun and
                  Zhiqiang Li and
                  Qiben Yan and
                  Witawas Srisa{-}an and
                  Yu Pan},
  title        = {SigPID: significant permission identification for android malware
                  detection},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888730},
  doi          = {10.1109/MALWARE.2016.7888730},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/SunLYSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TroiaVAS16,
  author       = {Fabio Di Troia and
                  Corrado Aaron Visaggio and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Advanced transcriptase for JavaScript malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {121--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888737},
  doi          = {10.1109/MALWARE.2016.7888737},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TroiaVAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/UpchurchZ16,
  author       = {Jason Upchurch and
                  Xiaobo Zhou},
  title        = {Malware provenance: code reuse detection in malicious software at
                  scale},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888735},
  doi          = {10.1109/MALWARE.2016.7888735},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/UpchurchZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Villegas16,
  author       = {Angel M. Villegas},
  title        = {Function identification and recovery signature tool},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888741},
  doi          = {10.1109/MALWARE.2016.7888741},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Villegas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Vitaliev16,
  author       = {Dimitri Vitaliev},
  title        = {Keynote speaker},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888720},
  doi          = {10.1109/MALWARE.2016.7888720},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Vitaliev16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2016,
  title        = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7884714/proceeding},
  isbn         = {978-1-5090-4542-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/0002ESS15,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou and
                  Vincent Sritapan},
  title        = {Targeted DoS on android: how to disable android in 10 seconds or less},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413694},
  doi          = {10.1109/MALWARE.2015.7413694},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/0002ESS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AbrahamABLT15,
  author       = {Adrien Abraham and
                  Radoniaina Andriatsimandefitra and
                  Adrien Brunelat and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Val{\'{e}}rie Viet Triem Tong},
  title        = {GroddDroid: a gorilla for triggering malicious behaviors},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {119--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413692},
  doi          = {10.1109/MALWARE.2015.7413692},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AbrahamABLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AresuAAMG15,
  author       = {Marco Aresu and
                  Davide Ariu and
                  Mansour Ahmadi and
                  Davide Maiorca and
                  Giorgio Giacinto},
  title        = {Clustering android malware families by http traffic},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {128--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413693},
  doi          = {10.1109/MALWARE.2015.7413693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AresuAAMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BanescuWSGOP15,
  author       = {Sebastian Banescu and
                  Tobias W{\"{u}}chner and
                  Aleieldin Salem and
                  Marius Guggenmos and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  title        = {A framework for empirical evaluation of malware detection resilience
                  against behavior obfuscation},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413683},
  doi          = {10.1109/MALWARE.2015.7413683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BanescuWSGOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteMS15,
  author       = {Guillaume Bonfante and
                  Jean{-}Yves Marion and
                  Fabrice Sabatier},
  title        = {Gorille sniffs code similarities, the case study of qwerty versus
                  regin},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413688},
  doi          = {10.1109/MALWARE.2015.7413688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CanzaneseMK15,
  author       = {Raymond Canzanese and
                  Spiros Mancoridis and
                  Moshe Kam},
  title        = {Run-time classification of malicious processes using system call analysis},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {21--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413681},
  doi          = {10.1109/MALWARE.2015.7413681},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CanzaneseMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GhoshMCM15,
  author       = {Krishnendu Ghosh and
                  Jose Andre Morales and
                  William Casey and
                  Bud Mishra},
  title        = {Sandboxing and reasoning on malware infection trees},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {69--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413686},
  doi          = {10.1109/MALWARE.2015.7413686},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GhoshMCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KerberTM15,
  author       = {Florian Kerber and
                  Dominik Teubert and
                  Ulrike Meyer},
  title        = {Covert remote syscall communication at kernel level: {A} {SPOOKY}
                  backdoor},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {74--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413687},
  doi          = {10.1109/MALWARE.2015.7413687},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KerberTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LeitoldHOG15,
  author       = {Ferenc Leitold and
                  Kalman Hadarics and
                  Eszter Oroszi and
                  Krisztina Gyorffy},
  title        = {Measuring the information security risk in an infrastructure},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413689},
  doi          = {10.1109/MALWARE.2015.7413689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LeitoldHOG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LevesqueSBF15,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Anil Somayaji and
                  Dennis Batchelder and
                  Jos{\'{e}} M. Fernandez},
  title        = {Measuring the health of antivirus ecosystems},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413690},
  doi          = {10.1109/MALWARE.2015.7413690},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LevesqueSBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LilleCRS15,
  author       = {David De Lille and
                  Bart Coppens and
                  Daan Raman and
                  Bjorn De Sutter},
  title        = {Automatically combining static malware detection techniques},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {48--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413684},
  doi          = {10.1109/MALWARE.2015.7413684},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LilleCRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OBrienL15,
  author       = {John O'Brien and
                  Kimmo Lehtonen},
  title        = {Counterfeit mobile devices - the duck test},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {144--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413695},
  doi          = {10.1109/MALWARE.2015.7413695},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OBrienL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OsorioQA15,
  author       = {Fernando C. Col{\'{o}}n Osorio and
                  Hongyuan Qiu and
                  Anthony Arrott},
  title        = {Segmented sandboxing - {A} novel approach to Malware polymorphism
                  detection},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {59--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413685},
  doi          = {10.1109/MALWARE.2015.7413685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OsorioQA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Paxson15,
  author       = {Vern Paxson},
  title        = {Keynote Speaker},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413676},
  doi          = {10.1109/MALWARE.2015.7413676},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Paxson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SaxeB15,
  author       = {Joshua Saxe and
                  Konstantin Berlin},
  title        = {Deep neural network based malware detection using two dimensional
                  binary program features},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413680},
  doi          = {10.1109/MALWARE.2015.7413680},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SaxeB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/UpchurchZ15,
  author       = {Jason Upchurch and
                  Xiaobo Zhou},
  title        = {Variant: a malware similarity testing framework},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {31--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413682},
  doi          = {10.1109/MALWARE.2015.7413682},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/UpchurchZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WatkinsSMR15,
  author       = {Lanier A. Watkins and
                  Kurt Silberberg and
                  Jose Andre Morales and
                  William H. Robinson},
  title        = {Using inherent command and control vulnerabilities to halt DDoS attacks},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413679},
  doi          = {10.1109/MALWARE.2015.7413679},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WatkinsSMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZhongFYBV15,
  author       = {Xingsi Zhong and
                  Yu Fu and
                  Lu Yu and
                  Richard R. Brooks and
                  Ganesh Kumar Venayagamoorthy},
  title        = {Stealthy malware traffic - Not as innocent as it looks},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {110--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413691},
  doi          = {10.1109/MALWARE.2015.7413691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZhongFYBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2015,
  title        = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7405773/proceeding},
  isbn         = {978-1-5090-0317-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BaraboschG14,
  author       = {Thomas Barabosch and
                  Elmar Gerhards{-}Padilla},
  title        = {Host-based code injection attacks: {A} popular technique used by malware},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {8--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999410},
  doi          = {10.1109/MALWARE.2014.6999410},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BaraboschG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CaseyWMAGM14,
  author       = {William Casey and
                  Evan Wright and
                  Jose Andre Morales and
                  Michael Appel and
                  Jeff Gennari and
                  Bud Mishra},
  title        = {Agent-based trace learning in a recommendation-verification system
                  for cybersecurity},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {135--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999404},
  doi          = {10.1109/MALWARE.2014.6999404},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CaseyWMAGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ClementiSO14,
  author       = {Andreas Clementi and
                  Peter Stelzhammer and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Global and local prevalence weighting of missed attack sample impacts
                  for endpoint security product comparative detection testing},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {35--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999413},
  doi          = {10.1109/MALWARE.2014.6999413},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ClementiSO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DingXCXM14,
  author       = {Wenbiao Ding and
                  Xiao Xing and
                  Ping Chen and
                  Zhi Xin and
                  Bing Mao},
  title        = {Automatic construction of printable return-oriented programming payload},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {18--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999408},
  doi          = {10.1109/MALWARE.2014.6999408},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DingXCXM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ElSheikhGGR14,
  author       = {Muhammad H. ElSheikh and
                  Mohammed S. Gadelrab and
                  Mahmoud A. Ghoneim and
                  Mohsen A. Rashwan},
  title        = {BoTGen: {A} new approach for in-lab generation of botnet datasets},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {76--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999406},
  doi          = {10.1109/MALWARE.2014.6999406},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ElSheikhGGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FioravantiF14,
  author       = {Mark E. Fioravanti II and
                  Richard Ford},
  title        = {Bacterial quorum sensing for coordination of targeted malware},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {101--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999405},
  doi          = {10.1109/MALWARE.2014.6999405},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FioravantiF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GassenC14,
  author       = {Jan Gassen and
                  Jonathan P. Chapman},
  title        = {HoneyAgent: Detecting malicious Java applets by using dynamic analysis},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {109--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999402},
  doi          = {10.1109/MALWARE.2014.6999402},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GassenC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GuriKKE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Assaf Kachlon and
                  Yuval Elovici},
  title        = {AirHopper: Bridging the air-gap between isolated networks and mobile
                  phones using radio frequencies},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999418},
  doi          = {10.1109/MALWARE.2014.6999418},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GuriKKE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JeongSLKLM14,
  author       = {Jihwan Jeong and
                  Dongwon Seo and
                  Chanyoung Lee and
                  Jonghoon Kwon and
                  Heejo Lee and
                  John Milburn},
  title        = {MysteryChecker: Unpredictable attestation to detect repackaged malicious
                  applications in Android},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999415},
  doi          = {10.1109/MALWARE.2014.6999415},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/JeongSLKLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KwonKLLP14,
  author       = {Jonghoon Kwon and
                  Jeongsik Kim and
                  Jehyun Lee and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {PsyBoG: Power spectral density analysis for detecting botnet groups},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999414},
  doi          = {10.1109/MALWARE.2014.6999414},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KwonKLLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LeitoldAO14,
  author       = {Ferenc Leitold and
                  Anthony Arrott and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Combining commercial consensus and community crowd-sourced categorization
                  of web sites for integrity against phishing and other web fraud},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999407},
  doi          = {10.1109/MALWARE.2014.6999407},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LeitoldAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LevesqueFS14,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Jos{\'{e}} M. Fernandez and
                  Anil Somayaji},
  title        = {Risk prediction of malware victimization based on user behavior},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {128--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999412},
  doi          = {10.1109/MALWARE.2014.6999412},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LevesqueFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SaxeTB14,
  author       = {Joshua Saxe and
                  Rafael Turner and
                  Kristina Blokhin},
  title        = {CrowdSource: Automated inference of high level malware functionality
                  from low-level symbols using a crowd trained machine learning model},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999417},
  doi          = {10.1109/MALWARE.2014.6999417},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SaxeTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SeidemanKV14,
  author       = {Jeremy D. Seideman and
                  Bilal Khan and
                  Antonio Cesar Vargas},
  title        = {Identifying malware genera using the Jensen-Shannon distance between
                  system call traces},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999409},
  doi          = {10.1109/MALWARE.2014.6999409},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SeidemanKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WatkinsKCR14,
  author       = {Lanier A. Watkins and
                  Christina Kawka and
                  Cherita L. Corbett and
                  William H. Robinson},
  title        = {Fighting banking botnets by exploiting inherent command and control
                  vulnerabilities},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999411},
  doi          = {10.1109/MALWARE.2014.6999411},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WatkinsKCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WuAO14,
  author       = {Jeffrey Wu and
                  Anthony Arrott and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Protection against remote code execution exploits of popular applications
                  in Windows},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {26--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999416},
  doi          = {10.1109/MALWARE.2014.6999416},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WuAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZwangerGM14,
  author       = {Viviane Zwanger and
                  Elmar Gerhards{-}Padilla and
                  Michael Meier},
  title        = {Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {118--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999403},
  doi          = {10.1109/MALWARE.2014.6999403},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZwangerGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2014,
  title        = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6987537/proceeding},
  isbn         = {978-1-4799-7328-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AdkinsJCU13,
  author       = {Francis Adkins and
                  Luke Jones and
                  Martin C. Carlisle and
                  Jason Upchurch},
  title        = {Heuristic malware detection via basic block comparison},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703680},
  doi          = {10.1109/MALWARE.2013.6703680},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AdkinsJCU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AndriesseRSPB13,
  author       = {Dennis Andriesse and
                  Christian Rossow and
                  Brett Stone{-}Gross and
                  Daniel Plohmann and
                  Herbert Bos},
  title        = {Highly resilient peer-to-peer botnets are here: An analysis of Gameover
                  Zeus},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {116--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703693},
  doi          = {10.1109/MALWARE.2013.6703693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AndriesseRSPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Bat-ErdeneKLL13,
  author       = {Munkhbayar Bat{-}Erdene and
                  Taebeom Kim and
                  Hongzhe Li and
                  Heejo Lee},
  title        = {Dynamic classification of packing algorithms for inspecting executables
                  using entropy analysis},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703681},
  doi          = {10.1109/MALWARE.2013.6703681},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Bat-ErdeneKLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteMST13,
  author       = {Guillaume Bonfante and
                  Jean{-}Yves Marion and
                  Fabrice Sabatier and
                  Aur{\'{e}}lien Thierry},
  title        = {Analysis and diversion of Duqu's driver},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {109--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703692},
  doi          = {10.1109/MALWARE.2013.6703692},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteMST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FedlerKS13,
  author       = {Rafael Fedler and
                  Marcel Kulicke and
                  Julian Sch{\"{u}}tte},
  title        = {An antivirus {API} for Android malware recognition},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703688},
  doi          = {10.1109/MALWARE.2013.6703688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FedlerKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GuriKSCRE13,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Tom Sela and
                  Buky Carmeli and
                  Amit Rosner and
                  Yuval Elovici},
  title        = {Noninvasive detection of anti-forensic malware},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703679},
  doi          = {10.1109/MALWARE.2013.6703679},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GuriKSCRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JhaFCSY13,
  author       = {Somesh Jha and
                  Matthew Fredrikson and
                  Mihai Christodorescu and
                  Reiner Sailer and
                  Xifeng Yan},
  title        = {Synthesizing near-optimal malware specifications from suspicious behaviors},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703684},
  doi          = {10.1109/MALWARE.2013.6703684},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LuCD13,
  author       = {Gen Lu and
                  Karan Chadha and
                  Saumya K. Debray},
  title        = {A simple client-side defense against environment-dependent web-based
                  malware},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {124--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703694},
  doi          = {10.1109/MALWARE.2013.6703694},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LuCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OsorioLMPMA13,
  author       = {Fernando C. Col{\'{o}}n Osorio and
                  Ferenc Leitold and
                  Dorottya Mike and
                  Chris Pickard and
                  Sveta Miladinov and
                  Anthony Arrott},
  title        = {Measuring the effectiveness of modern security products to detect
                  and contain emerging threats - {A} consensus-based approach},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {27--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703682},
  doi          = {10.1109/MALWARE.2013.6703682},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OsorioLMPMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OuellettePL13,
  author       = {Jacob Ouellette and
                  Avi Pfeffer and
                  Arun Lakhotia},
  title        = {Countering malware evolution using cloud-based learning},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703689},
  doi          = {10.1109/MALWARE.2013.6703689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OuellettePL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ProtsenkoM13,
  author       = {Mykola Protsenko and
                  Tilo M{\"{u}}ller},
  title        = {{PANDORA} applies non-deterministic obfuscation randomly to Android},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {59--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703686},
  doi          = {10.1109/MALWARE.2013.6703686},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ProtsenkoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/QiuO13,
  author       = {Hongyuan Qiu and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Static malware detection with Segmented Sandboxing},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {132--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703695},
  doi          = {10.1109/MALWARE.2013.6703695},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/QiuO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SapraHBS13,
  author       = {Karan Sapra and
                  Benafsh Husain and
                  Richard R. Brooks and
                  Melissa C. Smith},
  title        = {Circumventing keyloggers and screendumps},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {103--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703691},
  doi          = {10.1109/MALWARE.2013.6703691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SapraHBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/UpchurchZ13,
  author       = {Jason Upchurch and
                  Xiaobo Zhou},
  title        = {First byte: Force-based clustering of filtered block N-grams to detect
                  code reuse in malicious software},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {68--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703687},
  doi          = {10.1109/MALWARE.2013.6703687},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/UpchurchZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WhiteM13,
  author       = {Joshua S. White and
                  Jeanna N. Matthews},
  title        = {It's you on photo?: Automatic detection of Twitter accounts infected
                  with the Blackhole Exploit Kit},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703685},
  doi          = {10.1109/MALWARE.2013.6703685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WhiteM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WuA13,
  author       = {Jeffrey Wu and
                  Anthony Arrott},
  title        = {Use-case-specific metrics for comparative testing of endpoint security
                  products},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703683},
  doi          = {10.1109/MALWARE.2013.6703683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WuA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/YakdanEG13,
  author       = {Khaled Yakdan and
                  Sebastian Eschweiler and
                  Elmar Gerhards{-}Padilla},
  title        = {REcompile: {A} decompilation framework for static analysis of binaries},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703690},
  doi          = {10.1109/MALWARE.2013.6703690},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/YakdanEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2013,
  title        = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6693154/proceeding},
  isbn         = {978-1-4799-2534-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Al-BatainehW12,
  author       = {Areej Al{-}Bataineh and
                  Gregory White},
  title        = {Analysis and detection of malicious data exfiltration in web traffic},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {26--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461004},
  doi          = {10.1109/MALWARE.2012.6461004},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Al-BatainehW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AmamraTR12,
  author       = {Abdelfattah Amamra and
                  Chamseddine Talhi and
                  Jean{-}Marc Robert},
  title        = {Smartphone malware detection: From a survey towards taxonomy},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {79--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461012},
  doi          = {10.1109/MALWARE.2012.6461012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AmamraTR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BlizardL12,
  author       = {Tommy Blizard and
                  Nikola Livic},
  title        = {Click-fraud monetizing malware: {A} survey and case study},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {67--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461010},
  doi          = {10.1109/MALWARE.2012.6461010},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BlizardL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteMST12,
  author       = {Guillaume Bonfante and
                  Jean{-}Yves Marion and
                  Fabrice Sabatier and
                  Aur{\'{e}}lien Thierry},
  title        = {Code synchronization by morphological analysis},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461016},
  doi          = {10.1109/MALWARE.2012.6461016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HayN12,
  author       = {Brian Hay and
                  Kara L. Nance},
  title        = {Circumventing cryptography in virtualized environments},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461005},
  doi          = {10.1109/MALWARE.2012.6461005},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HayN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HerpichBCA12,
  author       = {Markus Herpich and
                  Leonid Batyuk and
                  Seyit Ahmet {\c{C}}amtepe and
                  Sahin Albayrak},
  title        = {A trusted ecosystem for Android applications based on context-aware
                  access control},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {73--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461011},
  doi          = {10.1109/MALWARE.2012.6461011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HerpichBCA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JinHCN12,
  author       = {Wesley Jin and
                  Charles Hines and
                  Cory F. Cohen and
                  Priya Narasimhan},
  title        = {A scalable search index for binary files},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {94--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461014},
  doi          = {10.1109/MALWARE.2012.6461014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JinHCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KwonL12,
  author       = {Jonghoon Kwon and
                  Heejo Lee},
  title        = {BinGraph: Discovering mutant malware using hierarchical semantic signatures},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {104--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461015},
  doi          = {10.1109/MALWARE.2012.6461015},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KwonL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LeitoldH12,
  author       = {Ferenc Leitold and
                  Kalman Hadarics},
  title        = {Measuring security risk in the cloud-enabled enterprise},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {62--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461009},
  doi          = {10.1109/MALWARE.2012.6461009},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LeitoldH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MarxDA12,
  author       = {Andreas Marx and
                  Alice Decker and
                  Anthony Arrott},
  title        = {Component protection metrics for security product development: I.
                  {AV-TEST} Full Product Tests},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461008},
  doi          = {10.1109/MALWARE.2012.6461008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MarxDA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MatenaarWLG12,
  author       = {Felix Matenaar and
                  Andr{\'{e}} Wichmann and
                  Felix Leder and
                  Elmar Gerhards{-}Padilla},
  title        = {{CIS:} The Crypto Intelligence System for automatic detection and
                  localization of cryptographic functions in current malware},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {46--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461007},
  doi          = {10.1109/MALWARE.2012.6461007},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MatenaarWLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PfefferCCKOPZLGBHS12,
  author       = {Avi Pfeffer and
                  Catherine Call and
                  John Chamberlain and
                  Lee Kellogg and
                  Jacob Ouellette and
                  Terry Patten and
                  Greg Zacharias and
                  Arun Lakhotia and
                  Suresh Golconda and
                  John Bay and
                  Robert Hall and
                  Daniel Scofield},
  title        = {Malware Analysis and attribution using Genetic Information},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {39--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461006},
  doi          = {10.1109/MALWARE.2012.6461006},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PfefferCCKOPZLGBHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PickardM12,
  author       = {Chris Pickard and
                  Sveta Miladinov},
  title        = {Rogue software: Protection against potentially unwanted applications},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461001},
  doi          = {10.1109/MALWARE.2012.6461001},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PickardM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SpauldingKS12,
  author       = {John Spaulding and
                  Alyssa Krauss and
                  Avinash Srinivasan},
  title        = {Exploring an open WiFi detection vulnerability as a malware attack
                  vector on iOS devices},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {87--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461013},
  doi          = {10.1109/MALWARE.2012.6461013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SpauldingKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WalensteinL12,
  author       = {Andrew Walenstein and
                  Arun Lakhotia},
  title        = {A transformation-based model of malware derivation},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {17--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461003},
  doi          = {10.1109/MALWARE.2012.6461003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WalensteinL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/XuZZ12,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  title        = {The power of obfuscation techniques in malicious JavaScript code:
                  {A} measurement study},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461002},
  doi          = {10.1109/MALWARE.2012.6461002},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/XuZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZhaoO12,
  author       = {Zhibo Zhao and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {"TrustDroid{\texttrademark}": Preventing the use of SmartPhones for
                  information leaking in corporate networks through the used of static
                  analysis taint tracking},
  booktitle    = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  pages        = {135--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MALWARE.2012.6461017},
  doi          = {10.1109/MALWARE.2012.6461017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZhaoO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2012,
  title        = {7th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2012, Fajardo, PR, USA, October 16-18, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6449416/proceeding},
  isbn         = {978-1-4673-4880-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BalanzaAADC11,
  author       = {Mark Balanza and
                  Kervin Alintanahin and
                  Oscar Abendan and
                  Julius Dizon and
                  Bernadette Caraig},
  title        = {DroidDreamLight lurks behind legitimate Android apps},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {73--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112329},
  doi          = {10.1109/MALWARE.2011.6112329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BalanzaAADC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BatyukHCRSA11,
  author       = {Leonid Batyuk and
                  Markus Herpich and
                  Seyit Ahmet {\c{C}}amtepe and
                  Karsten Raddatz and
                  Aubrey{-}Derrick Schmidt and
                  Sahin Albayrak},
  title        = {Using static analysis for automatic assessment and mitigation of unwanted
                  and malicious activities within Android applications},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {66--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112328},
  doi          = {10.1109/MALWARE.2011.6112328},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BatyukHCRSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BishopFR11,
  author       = {Matt Bishop and
                  Richard Ford and
                  Marco Ramilli},
  title        = {Results-oriented security},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {42--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112325},
  doi          = {10.1109/MALWARE.2011.6112325},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BishopFR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BrancoB11,
  author       = {Rodrigo Rubira Branco and
                  Gabriel Negreira Barbosa},
  title        = {Distributed malware analysis scheduling},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112324},
  doi          = {10.1109/MALWARE.2011.6112324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BrancoB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Gonzalez-RobledoNN11,
  author       = {Hugo Gonzalez{-}Robledo and
                  Kara Nance and
                  Jose Nazario},
  title        = {Phishing by form: The abuse of form sites},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {95--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112332},
  doi          = {10.1109/MALWARE.2011.6112332},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Gonzalez-RobledoNN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Leitold11,
  author       = {Ferenc Leitold},
  title        = {Testing protections against web threats},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {20--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112322},
  doi          = {10.1109/MALWARE.2011.6112322},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Leitold11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LiLD11,
  author       = {Frankie Li and
                  Anthony Lai and
                  DDL},
  title        = {Evidence of Advanced Persistent Threat: {A} case study of malware
                  for political espionage},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {102--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112333},
  doi          = {10.1109/MALWARE.2011.6112333},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LiLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LiuLZLC11,
  author       = {Chaoge Liu and
                  Weiqing Lu and
                  Zhiqi Zhang and
                  Peng Liao and
                  Xiang Cui},
  title        = {A recoverable hybrid C{\&}C botnet},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {110--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112334},
  doi          = {10.1109/MALWARE.2011.6112334},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LiuLZLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Lugo-CorderoGLR11,
  author       = {Hector M. Lugo{-}Cordero and
                  Ratan K. Guha and
                  Kejie Lu and
                  Domingo Rodr{\'{\i}}guez},
  title        = {Secure service distribution for VErsatile Service-Oriented Wireless
                  Mesh Networks},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {88--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112331},
  doi          = {10.1109/MALWARE.2011.6112331},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Lugo-CorderoGLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MoralesMLXS11,
  author       = {Jose Andre Morales and
                  Michael Main and
                  Weiliang Luo and
                  Shouhuai Xu and
                  Ravi S. Sandhu},
  title        = {Building malware infection trees},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112326},
  doi          = {10.1109/MALWARE.2011.6112326},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MoralesMLXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PhatakM11,
  author       = {Vikram Phatak and
                  Rick Moy},
  title        = {Evaluating security products based on appropriate usage},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {27--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112323},
  doi          = {10.1109/MALWARE.2011.6112323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PhatakM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PolychronakisK11,
  author       = {Michalis Polychronakis and
                  Angelos D. Keromytis},
  title        = {{ROP} payload detection using speculative code execution},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112327},
  doi          = {10.1109/MALWARE.2011.6112327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PolychronakisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/RamilliBS11,
  author       = {Marco Ramilli and
                  Matt Bishop and
                  Shining Sun},
  title        = {Multiprocess malware},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {8--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112320},
  doi          = {10.1109/MALWARE.2011.6112320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/RamilliBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SinghL11,
  author       = {Anshuman Singh and
                  Arun Lakhotia},
  title        = {Game-theoretic design of an information exchange model for detecting
                  packed malware},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112319},
  doi          = {10.1109/MALWARE.2011.6112319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SinghL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/StakhanovaCG11,
  author       = {Natalia Stakhanova and
                  Mathieu Couture and
                  Ali A. Ghorbani},
  title        = {Exploring network-based malware classification},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {14--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112321},
  doi          = {10.1109/MALWARE.2011.6112321},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/StakhanovaCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/YouN11,
  author       = {Dong{-}Hoon You and
                  Bong{-}Nam Noh},
  title        = {Android platform based linux kernel rootkit},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {79--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112330},
  doi          = {10.1109/MALWARE.2011.6112330},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/YouN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2011,
  title        = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6104282/proceeding},
  isbn         = {978-1-4673-0033-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BlasingBSCA10,
  author       = {Thomas Bl{\"{a}}sing and
                  Leonid Batyuk and
                  Aubrey{-}Derrick Schmidt and
                  Seyit Ahmet {\c{C}}amtepe and
                  Sahin Albayrak},
  title        = {An Android Application Sandbox system for suspicious software detection},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {55--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665792},
  doi          = {10.1109/MALWARE.2010.5665792},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BlasingBSCA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BrancoS10,
  author       = {Rodrigo Rubira Branco and
                  Udi Shamir},
  title        = {Architecture for automation of malware analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {106--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665786},
  doi          = {10.1109/MALWARE.2010.5665786},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BrancoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GnaedigKRW10,
  author       = {Isabelle Gnaedig and
                  Matthieu Kaczmarek and
                  Daniel Reynaud and
                  St{\'{e}}phane Wloka},
  title        = {Unconditional self-modifying code elimination with dynamic compiler
                  optimizations},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {47--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665795},
  doi          = {10.1109/MALWARE.2010.5665795},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GnaedigKRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JeongCLBL10,
  author       = {Guhyeon Jeong and
                  Euijin Choo and
                  Joosuk Lee and
                  Munkhbayar Bat{-}Erdene and
                  Heejo Lee},
  title        = {Generic unpacking using entropy analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665789},
  doi          = {10.1109/MALWARE.2010.5665789},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JeongCLBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KawakoyaII10,
  author       = {Yuhei Kawakoya and
                  Makoto Iwamura and
                  Mitsutaka Itoh},
  title        = {Memory behavior-based automatic malware unpacking in stealth debugging
                  environment},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665794},
  doi          = {10.1109/MALWARE.2010.5665794},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KawakoyaII10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MoralesSX10,
  author       = {Jose Andre Morales and
                  Ravi S. Sandhu and
                  Shouhuai Xu},
  title        = {Evaluating detection and treatment effectiveness of commercial anti-malware
                  programs},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665797},
  doi          = {10.1109/MALWARE.2010.5665797},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MoralesSX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MullinerS10,
  author       = {Collin Mulliner and
                  Jean{-}Pierre Seifert},
  title        = {Rise of the iBots: Owning a telco network},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {71--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665790},
  doi          = {10.1109/MALWARE.2010.5665790},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MullinerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OsorioP10,
  author       = {Fernando C. Col{\'{o}}n Osorio and
                  Frank S. Posluszny},
  title        = {Overcoming the limitations in computer worm models},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {81--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665791},
  doi          = {10.1109/MALWARE.2010.5665791},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OsorioP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/RamilliB10,
  author       = {Marco Ramilli and
                  Matt Bishop},
  title        = {Multi-stage delivery of malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {91--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665788},
  doi          = {10.1109/MALWARE.2010.5665788},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/RamilliB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SangLND10,
  author       = {Fernand Lone Sang and
                  {\'{E}}ric Lacombe and
                  Vincent Nicomette and
                  Yves Deswarte},
  title        = {Exploiting an {I/OMMU} vulnerability},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {7--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665798},
  doi          = {10.1109/MALWARE.2010.5665798},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SangLND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ShangZXXZ10,
  author       = {Shanhu Shang and
                  Ning Zheng and
                  Jian Xu and
                  Ming Xu and
                  Haiping Zhang},
  title        = {Detecting malware variants via function-call graph similarity},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665787},
  doi          = {10.1109/MALWARE.2010.5665787},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ShangZXXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ThomasN10,
  author       = {Kurt Thomas and
                  David M. Nicol},
  title        = {The Koobface botnet and the rise of social malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {63--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665793},
  doi          = {10.1109/MALWARE.2010.5665793},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ThomasN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TianIBV10,
  author       = {Ronghua Tian and
                  Md. Rafiqul Islam and
                  Lynn Margaret Batten and
                  Steven Versteeg},
  title        = {Differentiating malware from cleanware using behavioural analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665796},
  doi          = {10.1109/MALWARE.2010.5665796},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TianIBV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/VasiliadisPI10,
  author       = {Giorgos Vasiliadis and
                  Michalis Polychronakis and
                  Sotiris Ioannidis},
  title        = {GPU-assisted malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665801},
  doi          = {10.1109/MALWARE.2010.5665801},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/VasiliadisPI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WalensteinHW10,
  author       = {Andrew Walenstein and
                  Daniel J. Hefner and
                  Jeffery Wichers},
  title        = {Header information in malware families and impact on automated classifiers},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665799},
  doi          = {10.1109/MALWARE.2010.5665799},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WalensteinHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2010,
  title        = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5655114/proceeding},
  isbn         = {978-1-4244-9355-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CalvetDB09,
  author       = {Joan Calvet and
                  Carlton R. Davis and
                  Pierre{-}Marc Bureau},
  title        = {Malware authors don't learn, and that's good!},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {88--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403013},
  doi          = {10.1109/MALWARE.2009.5403013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CalvetDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DavisFN09,
  author       = {Carlton R. Davis and
                  Jos{\'{e}} M. Fernandez and
                  Stephen Neville},
  title        = {Optimising sybil attacks against P2P-based botnets},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {78--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403016},
  doi          = {10.1109/MALWARE.2009.5403016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DavisFN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FaghaniS09,
  author       = {Mohammad Reza Faghani and
                  Hossein Saidi},
  title        = {Malware propagation in Online Social Networks},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {8--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403023},
  doi          = {10.1109/MALWARE.2009.5403023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FaghaniS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GuizaniMR09,
  author       = {Wadie Guizani and
                  Jean{-}Yves Marion and
                  Daniel Reynaud{-}Plantey},
  title        = {Server-side dynamic code analysis},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {55--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403017},
  doi          = {10.1109/MALWARE.2009.5403017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GuizaniMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LederSM09,
  author       = {Felix Leder and
                  Bastian Steinbock and
                  Peter Martini},
  title        = {Classification and detection of metamorphic malware using value set
                  analysis},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403019},
  doi          = {10.1109/MALWARE.2009.5403019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LederSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LikarishJJ09,
  author       = {Peter Likarish and
                  Eunjin Jung and
                  Insoon Jo},
  title        = {Obfuscated malicious javascript detection using classification techniques},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {47--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403020},
  doi          = {10.1109/MALWARE.2009.5403020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LikarishJJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MoralesAXS09,
  author       = {Jose Andre Morales and
                  Areej Al{-}Bataineh and
                  Shouhuai Xu and
                  Ravi S. Sandhu},
  title        = {Analyzing {DNS} activities of bot processes},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {98--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403014},
  doi          = {10.1109/MALWARE.2009.5403014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MoralesAXS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SchmidtCCA09,
  author       = {Aubrey{-}Derrick Schmidt and
                  Jan Hendrik Clausen and
                  Seyit Ahmet {\c{C}}amtepe and
                  Sahin Albayrak},
  title        = {Detecting Symbian {OS} malware through static function call analysis},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403024},
  doi          = {10.1109/MALWARE.2009.5403024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SchmidtCCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SchmidtSBCCAY09,
  author       = {Aubrey{-}Derrick Schmidt and
                  Hans{-}Gunther Schmidt and
                  Leonid Batyuk and
                  Jan Hendrik Clausen and
                  Seyit Ahmet {\c{C}}amtepe and
                  Sahin Albayrak and
                  Can Yildizli},
  title        = {Smartphone malware evolution revisited: Android next target?},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403026},
  doi          = {10.1109/MALWARE.2009.5403026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SchmidtSBCCAY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SinclairNK09,
  author       = {Greg Sinclair and
                  Chris Nunnery and
                  Brent ByungHoon Kang},
  title        = {The waledac protocol: The how and why},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {69--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403015},
  doi          = {10.1109/MALWARE.2009.5403015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SinclairNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TianBIV09,
  author       = {Ronghua Tian and
                  Lynn Margaret Batten and
                  Md. Rafiqul Islam and
                  Steven Versteeg},
  title        = {An automated classification system based on the strings of trojan
                  and virus families},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403021},
  doi          = {10.1109/MALWARE.2009.5403021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TianBIV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WagnerWSE09,
  author       = {Cynthia Wagner and
                  G{\'{e}}rard Wagener and
                  Radu State and
                  Thomas Engel},
  title        = {Malware analysis with graph kernels and support vector machines},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {63--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403018},
  doi          = {10.1109/MALWARE.2009.5403018},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WagnerWSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WernerFGM09,
  author       = {Tillmann Werner and
                  Christoph Fuchs and
                  Elmar Gerhards{-}Padilla and
                  Peter Martini},
  title        = {Nebula - generating syntactical network intrusion signatures},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403022},
  doi          = {10.1109/MALWARE.2009.5403022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WernerFGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2009,
  title        = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5392747/proceeding},
  isbn         = {978-1-4244-5787-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteKM08,
  author       = {Guillaume Bonfante and
                  Matthieu Kaczmarek and
                  Jean{-}Yves Marion},
  title        = {Morphological detection of malware},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690851},
  doi          = {10.1109/MALWARE.2008.4690851},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ChouchaneWL08,
  author       = {Mohamed R. Chouchane and
                  Andrew Walenstein and
                  Arun Lakhotia},
  title        = {Using Markov chains to filter machine-morphed variants of malicious
                  programs},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690861},
  doi          = {10.1109/MALWARE.2008.4690861},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ChouchaneWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Craioveanu08,
  author       = {Cristian Craioveanu},
  title        = {Server-side script polumorphism: Techniques of analysis and defense},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690852},
  doi          = {10.1109/MALWARE.2008.4690852},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Craioveanu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DavisFNM08,
  author       = {Carlton R. Davis and
                  Jos{\'{e}} M. Fernandez and
                  Stephen Neville and
                  John McHugh},
  title        = {Sybil attacks as a mitigation strategy against the Storm botnet},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {32--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690855},
  doi          = {10.1109/MALWARE.2008.4690855},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DavisFNM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DittrichD08,
  author       = {David Dittrich and
                  Sven Dietrich},
  title        = {{P2P} as botnet command and control: {A} deeper insight},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690856},
  doi          = {10.1109/MALWARE.2008.4690856},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DittrichD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HarleyB08,
  author       = {David Harley and
                  Pierre{-}Marc Bureau},
  title        = {Drive-by downloads from the trenches},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {98--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690864},
  doi          = {10.1109/MALWARE.2008.4690864},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HarleyB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LevyPK08,
  author       = {Jamie Levy and
                  Jaroslaw Paduch and
                  Bilal Khan},
  title        = {Superimposing permutational covert channels onto reliable stream protocols},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690857},
  doi          = {10.1109/MALWARE.2008.4690857},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LevyPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NazarioH08,
  author       = {Jose Nazario and
                  Thorsten Holz},
  title        = {As the net churns: Fast-flux botnet observations},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690854},
  doi          = {10.1109/MALWARE.2008.4690854},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/NazarioH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NielsonCA08,
  author       = {Jordan Nielson and
                  Daniel Medeiros Nunes de Castro and
                  John Aycock},
  title        = {Image spam - {ASCII} to the rescue!},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {65--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690859},
  doi          = {10.1109/MALWARE.2008.4690859},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/NielsonCA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Osorio08,
  author       = {Fernando C. Col{\'{o}}n Osorio},
  title        = {State of wireless security implementations in the United States and
                  Europe - empirical data},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {92--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690863},
  doi          = {10.1109/MALWARE.2008.4690863},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Osorio08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SinhaBJ08,
  author       = {Sushant Sinha and
                  Michael D. Bailey and
                  Farnam Jahanian},
  title        = {Shades of grey: On the effectiveness of reputation-based "blacklists"},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {57--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690858},
  doi          = {10.1109/MALWARE.2008.4690858},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SinhaBJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SunEB08,
  author       = {Li Sun and
                  Tim Ebringer and
                  S. Boztag},
  title        = {An automatic anti-anti-VMware technique applicable for multi-stage
                  packed malware},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690853},
  doi          = {10.1109/MALWARE.2008.4690853},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SunEB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ThomasJ08,
  author       = {Vinoo Thomas and
                  Nitin Jyoti},
  title        = {Combating file infectors on corporate networks},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {85--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690862},
  doi          = {10.1109/MALWARE.2008.4690862},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ThomasJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TianBV08,
  author       = {Ronghua Tian and
                  Lynn Margaret Batten and
                  Steven Versteeg},
  title        = {Function length as a tool for malware classification},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690860},
  doi          = {10.1109/MALWARE.2008.4690860},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TianBV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2008,
  title        = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4686744/proceeding},
  isbn         = {978-1-4244-3288-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics