default search action
Search dblp for Publications
export results for "toc:db/conf/malware/malware2010.bht:"
@inproceedings{DBLP:conf/malware/BlasingBSCA10, author = {Thomas Bl{\"{a}}sing and Leonid Batyuk and Aubrey{-}Derrick Schmidt and Seyit Ahmet {\c{C}}amtepe and Sahin Albayrak}, title = {An Android Application Sandbox system for suspicious software detection}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {55--62}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665792}, doi = {10.1109/MALWARE.2010.5665792}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BlasingBSCA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BrancoS10, author = {Rodrigo Rubira Branco and Udi Shamir}, title = {Architecture for automation of malware analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {106--112}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665786}, doi = {10.1109/MALWARE.2010.5665786}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BrancoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/GnaedigKRW10, author = {Isabelle Gnaedig and Matthieu Kaczmarek and Daniel Reynaud and St{\'{e}}phane Wloka}, title = {Unconditional self-modifying code elimination with dynamic compiler optimizations}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665795}, doi = {10.1109/MALWARE.2010.5665795}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/GnaedigKRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JeongCLBL10, author = {Guhyeon Jeong and Euijin Choo and Joosuk Lee and Munkhbayar Bat{-}Erdene and Heejo Lee}, title = {Generic unpacking using entropy analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665789}, doi = {10.1109/MALWARE.2010.5665789}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JeongCLBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KawakoyaII10, author = {Yuhei Kawakoya and Makoto Iwamura and Mitsutaka Itoh}, title = {Memory behavior-based automatic malware unpacking in stealth debugging environment}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665794}, doi = {10.1109/MALWARE.2010.5665794}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/KawakoyaII10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MoralesSX10, author = {Jose Andre Morales and Ravi S. Sandhu and Shouhuai Xu}, title = {Evaluating detection and treatment effectiveness of commercial anti-malware programs}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665797}, doi = {10.1109/MALWARE.2010.5665797}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MoralesSX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MullinerS10, author = {Collin Mulliner and Jean{-}Pierre Seifert}, title = {Rise of the iBots: Owning a telco network}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {71--80}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665790}, doi = {10.1109/MALWARE.2010.5665790}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MullinerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OsorioP10, author = {Fernando C. Col{\'{o}}n Osorio and Frank S. Posluszny}, title = {Overcoming the limitations in computer worm models}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {81--90}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665791}, doi = {10.1109/MALWARE.2010.5665791}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/OsorioP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/RamilliB10, author = {Marco Ramilli and Matt Bishop}, title = {Multi-stage delivery of malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {91--97}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665788}, doi = {10.1109/MALWARE.2010.5665788}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/RamilliB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SangLND10, author = {Fernand Lone Sang and {\'{E}}ric Lacombe and Vincent Nicomette and Yves Deswarte}, title = {Exploiting an {I/OMMU} vulnerability}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {7--14}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665798}, doi = {10.1109/MALWARE.2010.5665798}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SangLND10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ShangZXXZ10, author = {Shanhu Shang and Ning Zheng and Jian Xu and Ming Xu and Haiping Zhang}, title = {Detecting malware variants via function-call graph similarity}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665787}, doi = {10.1109/MALWARE.2010.5665787}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ShangZXXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ThomasN10, author = {Kurt Thomas and David M. Nicol}, title = {The Koobface botnet and the rise of social malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {63--70}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665793}, doi = {10.1109/MALWARE.2010.5665793}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ThomasN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TianIBV10, author = {Ronghua Tian and Md. Rafiqul Islam and Lynn Margaret Batten and Steven Versteeg}, title = {Differentiating malware from cleanware using behavioural analysis}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {23--30}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665796}, doi = {10.1109/MALWARE.2010.5665796}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TianIBV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/VasiliadisPI10, author = {Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis}, title = {GPU-assisted malware}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665801}, doi = {10.1109/MALWARE.2010.5665801}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/VasiliadisPI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WalensteinHW10, author = {Andrew Walenstein and Daniel J. Hefner and Jeffery Wichers}, title = {Header information in malware families and impact on automated classifiers}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665799}, doi = {10.1109/MALWARE.2010.5665799}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/WalensteinHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2010, title = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5655114/proceeding}, isbn = {978-1-4244-9355-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.