default search action
Journal in Computer Virology, Volume 7
Volume 7, Number 1, February 2011
- Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Enforcing kernel constraints by hardware-assisted virtualization. 1-21 - Anthony Desnos, Eric Filiol, Ivan Lefou:
Detecting (and creating !) a HVM rootkit (aka BluePill-like). 23-49 - Manuel Egele, Clemens Kolbitsch, Christian Platzer:
Removing web spam links from search engine results. 51-62 - Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam:
Accuracy improving guidelines for network anomaly detection systems. 63-81 - Julien Desfossez, Justine Dieppedale, Gabriel Girard:
Stealth malware analysis from kernel space with Kolumbo. 83-93
Volume 7, Number 2, May 2011
- Hassan Khan, Fauzan Mirza, Syed Ali Khayam:
Determining malicious executable distinguishing attributes and low-complexity detection. 95-105 - Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala:
Malware detection using assembly and API call sequences. 107-119 - Daniel Quist, Lorie M. Liebrock, Joshua Neil:
Improving antivirus accuracy with hypervisor assisted analysis. 121-131 - Dai Geng, Tomohiro Odaka, Jousuke Kuroiwa, Hisakazu Ogura:
An N-Gram and STF-IDF model for masquerade detection in a UNIX environment. 133-142 - Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. 143-157 - Syed Ali Khayam, Ayesha Binte Ashfaq, Hayder Radha:
Joint network-host based malware detection using information-theoretic tools. 159-172
Volume 7, Number 3, August 2011
- Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. 173-188 - Vlasti Broucek, Paul Turner, Mark Zimmerli:
Managing university internet access: balancing the need for security, privacy and digital evidence. 189-199 - Da Lin, Mark Stamp:
Hunting for undetectable metamorphic viruses. 201-214 - Iain Sutherland, Gareth Davies, Andrew Blyth:
Malware and steganography in hard disk firmware. 215-219 - Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:
Heliza: talking dirty to the attackers. 221-232
Volume 7, Number 4, November 2011
- Joris Kinable, Orestis Kostakis:
Malware classification based on call graph clustering. 233-245 - Blake Anderson, Daniel Quist, Joshua Neil, Curtis B. Storlie, Terran Lane:
Graph-based malware detection using dynamic analysis. 247-258 - Ivan Sorokin:
Comparing files using structural entropy. 259-265 - FuYong Zhang, DeYu Qi:
Run-time malware detection based on positive selection. 267-277 - Irfan Ahmed, Kyung-suk Lhee:
Classification of packet contents for malware detection. 279-295
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.