


default search action
8th MALWARE 2013: Fajardo, PR, USA
- 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2534-6

- Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici:

Noninvasive detection of anti-forensic malware. 1-10 - Francis Adkins, Luke Jones, Martin C. Carlisle

, Jason Upchurch:
Heuristic malware detection via basic block comparison. 11-18 - Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee:

Dynamic classification of packing algorithms for inspecting executables using entropy analysis. 19-26 - Fernando C. Colón Osorio, Ferenc Leitold, Dorottya Mike, Chris Pickard, Sveta Miladinov, Anthony Arrott:

Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach. 27-34 - Jeffrey Wu, Anthony Arrott:

Use-case-specific metrics for comparative testing of endpoint security products. 35-40 - Somesh Jha, Matthew Fredrikson

, Mihai Christodorescu, Reiner Sailer, Xifeng Yan:
Synthesizing near-optimal malware specifications from suspicious behaviors. 41-50 - Joshua S. White, Jeanna N. Matthews

:
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit. 51-58 - Mykola Protsenko, Tilo Müller:

PANDORA applies non-deterministic obfuscation randomly to Android. 59-67 - Jason Upchurch, Xiaobo Zhou:

First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. 68-76 - Rafael Fedler, Marcel Kulicke, Julian Schütte

:
An antivirus API for Android malware recognition. 77-84 - Jacob Ouellette, Avi Pfeffer, Arun Lakhotia:

Countering malware evolution using cloud-based learning. 85-94 - Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla:

REcompile: A decompilation framework for static analysis of binaries. 95-102 - Karan Sapra, Benafsh Husain, Richard R. Brooks

, Melissa C. Smith:
Circumventing keyloggers and screendumps. 103-108 - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry:

Analysis and diversion of Duqu's driver. 109-115 - Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann

, Herbert Bos
:
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. 116-123 - Gen Lu, Karan Chadha, Saumya K. Debray:

A simple client-side defense against environment-dependent web-based malware. 124-131 - Hongyuan Qiu, Fernando C. Colón Osorio:

Static malware detection with Segmented Sandboxing. 132-141

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














