


default search action
9th MALWARE 2014: Fajardo, PR, USA
- 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7328-6
Emerging Threats and Malware Classification
- Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas:
Identifying malware genera using the Jensen-Shannon distance between system call traces. 1-7 - Thomas Barabosch, Elmar Gerhards-Padilla:
Host-based code injection attacks: A popular technique used by malware. 8-17 - Wenbiao Ding, Xiao Xing, Ping Chen, Zhi Xin, Bing Mao:
Automatic construction of printable return-oriented programming payload. 18-25
The Measurement Problem
- Jeffrey Wu, Anthony Arrott, Fernando C. Colón Osorio:
Protection against remote code execution exploits of popular applications in Windows. 26-31 - Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio:
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. 35-42 - Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio:
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. 40-49
Mobile Malware
- Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon
, Heejo Lee, John Milburn:
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. 50-57 - Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. 58-67 - Joshua Saxe, Rafael Turner, Kristina Blokhin:
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. 68-75
Botnets & Other Musings
- Muhammad ElSheikh
, Mohammed S. Gadelrab
, Mahmoud A. Ghoneim, Mohsen A. Rashwan
:
BoTGen: A new approach for in-lab generation of botnet datasets. 76-84 - Jonghoon Kwon
, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: Power spectral density analysis for detecting botnet groups. 85-92 - Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson
:
Fighting banking botnets by exploiting inherent command and control vulnerabilities. 93-100 - Mark E. Fioravanti II, Richard Ford:
Bacterial quorum sensing for coordination of targeted malware. 101-108
HoneyAgents, Intelligent Defenses, and other Anti-Malware techniques
- Jan Gassen, Jonathan P. Chapman:
HoneyAgent: Detecting malicious Java applets by using dynamic analysis. 109-117 - Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier
:
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. 118-127 - Fanny Lalonde Lévesque, José M. Fernandez
, Anil Somayaji:
Risk prediction of malware victimization based on user behavior. 128-134 - William Casey, Evan Wright, Jose Andre Morales
, Michael Appel, Jeff Gennari, Bud Mishra:
Agent-based trace learning in a recommendation-verification system for cybersecurity. 135-143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.