![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/malware/malware2016.bht:"
@inproceedings{DBLP:conf/malware/AnhND16, author = {Huynh Ngoc Anh and Wee Keong Ng and Hoang Giang Do}, title = {On periodic behavior of malware: experiments, opportunities and challenges}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {85--92}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888733}, doi = {10.1109/MALWARE.2016.7888733}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AnhND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BlackO16, author = {Paul Black and Joseph Opacki}, title = {Anti-analysis trends in banking malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {129--135}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888738}, doi = {10.1109/MALWARE.2016.7888738}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BlackO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CaseyS16, author = {William Casey and Aaron Shelmire}, title = {Signature limits: an entire map of clone features and their discovery in nearly linear time}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888740}, doi = {10.1109/MALWARE.2016.7888740}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CaseyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DamT16, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Automatic extraction of malicious behaviors}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {47--56}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888729}, doi = {10.1109/MALWARE.2016.7888729}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DamT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FuJYZB16, author = {Yu Fu and Zhe Jia and Lu Yu and Xingsi Zhong and Richard R. Brooks}, title = {A covert data transport protocol}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {93--100}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888734}, doi = {10.1109/MALWARE.2016.7888734}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FuJYZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/IqbalZ16, author = {Md. Shahrear Iqbal and Mohammad Zulkernine}, title = {Zonedroid: control your droid through application zoning}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888736}, doi = {10.1109/MALWARE.2016.7888736}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/IqbalZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JonesSC16, author = {Luke Jones and Andrew J. Sellers and Martin C. Carlisle}, title = {{CARDINAL:} similarity analysis to defeat malware compiler variations}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888728}, doi = {10.1109/MALWARE.2016.7888728}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JonesSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KarbabDAM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Saed Alrabaee and Djedjiga Mouheb}, title = {DySign: dynamic fingerprinting for the automatic detection of android malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888739}, doi = {10.1109/MALWARE.2016.7888739}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KitanaTW16, author = {Asem Kitana and Issa Traor{\'{e}} and Isaac Woungang}, title = {Impact of base transceiver station selection mechanisms on a mobile botnet over a {LTE} network}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {20--30}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888726}, doi = {10.1109/MALWARE.2016.7888726}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KitanaTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Korczynski16, author = {David Korczynski}, title = {RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888727}, doi = {10.1109/MALWARE.2016.7888727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Korczynski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KyweLHY16, author = {Su Mon Kywe and Yingjiu Li and Jason I. Hong and Cheng Yao}, title = {Dissecting developer policy violating apps: characterization and detection}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {10--19}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888725}, doi = {10.1109/MALWARE.2016.7888725}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KyweLHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Morales-OrtegaE16, author = {Salvador Morales{-}Ortega and Ponciano Jorge Escamilla{-}Ambrosio and Abraham Rodriguez{-}Mota and Lilian D. Coronado{-}De{-}Alba}, title = {Native malware detection in smartphones with android {OS} using static analysis, feature selection and ensemble classifiers}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888731}, doi = {10.1109/MALWARE.2016.7888731}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Morales-OrtegaE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Osorio16, author = {Fernando C. Col{\'{o}}n Osorio}, title = {Message from the general program chair}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888718}, doi = {10.1109/MALWARE.2016.7888718}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Osorio16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/PingAM16, author = {Matthew Ping and Bander Alsulami and Spiros Mancoridis}, title = {On the effectiveness of application characteristics in the automatic classification of malware on smartphones}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888732}, doi = {10.1109/MALWARE.2016.7888732}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/PingAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/RazoAE16, author = {Sergio Ivan Vargas Razo and Eleazar Aguirre Anaya and Ponciano Jorge Escamilla{-}Ambrosio}, title = {Reverse engineering with bioinformatics algorithms over a sound android covert channel}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {3--9}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888724}, doi = {10.1109/MALWARE.2016.7888724}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/RazoAE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SunLYSP16, author = {Lichao Sun and Zhiqiang Li and Qiben Yan and Witawas Srisa{-}an and Yu Pan}, title = {SigPID: significant permission identification for android malware detection}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888730}, doi = {10.1109/MALWARE.2016.7888730}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/SunLYSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TroiaVAS16, author = {Fabio Di Troia and Corrado Aaron Visaggio and Thomas H. Austin and Mark Stamp}, title = {Advanced transcriptase for JavaScript malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {121--128}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888737}, doi = {10.1109/MALWARE.2016.7888737}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TroiaVAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/UpchurchZ16, author = {Jason Upchurch and Xiaobo Zhou}, title = {Malware provenance: code reuse detection in malicious software at scale}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {101--109}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888735}, doi = {10.1109/MALWARE.2016.7888735}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/UpchurchZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Villegas16, author = {Angel M. Villegas}, title = {Function identification and recovery signature tool}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {157--164}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888741}, doi = {10.1109/MALWARE.2016.7888741}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Villegas16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Vitaliev16, author = {Dimitri Vitaliev}, title = {Keynote speaker}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888720}, doi = {10.1109/MALWARE.2016.7888720}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Vitaliev16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2016, title = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7884714/proceeding}, isbn = {978-1-5090-4542-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.