default search action
7th MALWARE 2012: Fajardo, PR, USA
- 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4880-5
- Chris Pickard, Sveta Miladinov:
Rogue software: Protection against potentially unwanted applications. 1-8 - Wei Xu, Fangfang Zhang, Sencun Zhu:
The power of obfuscation techniques in malicious JavaScript code: A measurement study. 9-16 - Andrew Walenstein, Arun Lakhotia:
A transformation-based model of malware derivation. 17-25 - Areej Al-Bataineh, Gregory White:
Analysis and detection of malicious data exfiltration in web traffic. 26-31 - Brian Hay, Kara L. Nance:
Circumventing cryptography in virtualized environments. 32-38 - Avi Pfeffer, Catherine Call, John Chamberlain, Lee Kellogg, Jacob Ouellette, Terry Patten, Greg Zacharias, Arun Lakhotia, Suresh Golconda, John Bay, Robert Hall, Daniel Scofield:
Malware Analysis and attribution using Genetic Information. 39-45 - Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla:
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware. 46-53 - Andreas Marx, Alice Decker, Anthony Arrott:
Component protection metrics for security product development: I. AV-TEST Full Product Tests. 54-61 - Ferenc Leitold, Kalman Hadarics:
Measuring security risk in the cloud-enabled enterprise. 62-66 - Tommy Blizard, Nikola Livic:
Click-fraud monetizing malware: A survey and case study. 67-72 - Markus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak:
A trusted ecosystem for Android applications based on context-aware access control. 73-78 - Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:
Smartphone malware detection: From a survey towards taxonomy. 79-86 - John Spaulding, Alyssa Krauss, Avinash Srinivasan:
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. 87-93 - Wesley Jin, Charles Hines, Cory F. Cohen, Priya Narasimhan:
A scalable search index for binary files. 94-103 - Jonghoon Kwon, Heejo Lee:
BinGraph: Discovering mutant malware using hierarchical semantic signatures. 104-111 - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry:
Code synchronization by morphological analysis. 112-119 - Zhibo Zhao, Fernando C. Colón Osorio:
"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. 135-143
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.