Search dblp for Publications

export results for "toc:db/conf/malware/malware2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/malware/BlasingBSCA10,
  author       = {Thomas Bl{\"{a}}sing and
                  Leonid Batyuk and
                  Aubrey{-}Derrick Schmidt and
                  Seyit Ahmet {\c{C}}amtepe and
                  Sahin Albayrak},
  title        = {An Android Application Sandbox system for suspicious software detection},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {55--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665792},
  doi          = {10.1109/MALWARE.2010.5665792},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BlasingBSCA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BrancoS10,
  author       = {Rodrigo Rubira Branco and
                  Udi Shamir},
  title        = {Architecture for automation of malware analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {106--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665786},
  doi          = {10.1109/MALWARE.2010.5665786},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BrancoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GnaedigKRW10,
  author       = {Isabelle Gnaedig and
                  Matthieu Kaczmarek and
                  Daniel Reynaud and
                  St{\'{e}}phane Wloka},
  title        = {Unconditional self-modifying code elimination with dynamic compiler
                  optimizations},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {47--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665795},
  doi          = {10.1109/MALWARE.2010.5665795},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GnaedigKRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JeongCLBL10,
  author       = {Guhyeon Jeong and
                  Euijin Choo and
                  Joosuk Lee and
                  Munkhbayar Bat{-}Erdene and
                  Heejo Lee},
  title        = {Generic unpacking using entropy analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665789},
  doi          = {10.1109/MALWARE.2010.5665789},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JeongCLBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KawakoyaII10,
  author       = {Yuhei Kawakoya and
                  Makoto Iwamura and
                  Mitsutaka Itoh},
  title        = {Memory behavior-based automatic malware unpacking in stealth debugging
                  environment},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665794},
  doi          = {10.1109/MALWARE.2010.5665794},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KawakoyaII10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MoralesSX10,
  author       = {Jose Andre Morales and
                  Ravi S. Sandhu and
                  Shouhuai Xu},
  title        = {Evaluating detection and treatment effectiveness of commercial anti-malware
                  programs},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665797},
  doi          = {10.1109/MALWARE.2010.5665797},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MoralesSX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MullinerS10,
  author       = {Collin Mulliner and
                  Jean{-}Pierre Seifert},
  title        = {Rise of the iBots: Owning a telco network},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {71--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665790},
  doi          = {10.1109/MALWARE.2010.5665790},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MullinerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OsorioP10,
  author       = {Fernando C. Col{\'{o}}n Osorio and
                  Frank S. Posluszny},
  title        = {Overcoming the limitations in computer worm models},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {81--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665791},
  doi          = {10.1109/MALWARE.2010.5665791},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OsorioP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/RamilliB10,
  author       = {Marco Ramilli and
                  Matt Bishop},
  title        = {Multi-stage delivery of malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {91--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665788},
  doi          = {10.1109/MALWARE.2010.5665788},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/RamilliB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SangLND10,
  author       = {Fernand Lone Sang and
                  {\'{E}}ric Lacombe and
                  Vincent Nicomette and
                  Yves Deswarte},
  title        = {Exploiting an {I/OMMU} vulnerability},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {7--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665798},
  doi          = {10.1109/MALWARE.2010.5665798},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SangLND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ShangZXXZ10,
  author       = {Shanhu Shang and
                  Ning Zheng and
                  Jian Xu and
                  Ming Xu and
                  Haiping Zhang},
  title        = {Detecting malware variants via function-call graph similarity},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665787},
  doi          = {10.1109/MALWARE.2010.5665787},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ShangZXXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ThomasN10,
  author       = {Kurt Thomas and
                  David M. Nicol},
  title        = {The Koobface botnet and the rise of social malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {63--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665793},
  doi          = {10.1109/MALWARE.2010.5665793},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ThomasN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TianIBV10,
  author       = {Ronghua Tian and
                  Md. Rafiqul Islam and
                  Lynn Margaret Batten and
                  Steven Versteeg},
  title        = {Differentiating malware from cleanware using behavioural analysis},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665796},
  doi          = {10.1109/MALWARE.2010.5665796},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TianIBV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/VasiliadisPI10,
  author       = {Giorgos Vasiliadis and
                  Michalis Polychronakis and
                  Sotiris Ioannidis},
  title        = {GPU-assisted malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665801},
  doi          = {10.1109/MALWARE.2010.5665801},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/VasiliadisPI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WalensteinHW10,
  author       = {Andrew Walenstein and
                  Daniel J. Hefner and
                  Jeffery Wichers},
  title        = {Header information in malware families and impact on automated classifiers},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665799},
  doi          = {10.1109/MALWARE.2010.5665799},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WalensteinHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2010,
  title        = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5655114/proceeding},
  isbn         = {978-1-4244-9355-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}