


default search action
10th MALWARE 2015: Fajardo, PR, USA
- 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0317-4

- Vern Paxson:

Keynote Speaker. 1
Session 1 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson

:
Using inherent command and control vulnerabilities to halt DDoS attacks. 3-10 - Joshua Saxe, Konstantin Berlin:

Deep neural network based malware detection using two dimensional binary program features. 11-20 - Raymond Canzanese, Spiros Mancoridis, Moshe Kam:

Run-time classification of malicious processes using system call analysis. 21-28
Session 2 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- Jason Upchurch, Xiaobo Zhou:

Variant: a malware similarity testing framework. 31-39 - Sebastian Banescu

, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa
, Alexander Pretschner:
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. 40-47 - David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter:

Automatically combining static malware detection techniques. 48-55
Session 3 - Mechanisms and Strategies to Thwart Attacks
- Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott:

Segmented sandboxing - A novel approach to Malware polymorphism detection. 59-68 - Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra:

Sandboxing and reasoning on malware infection trees. 69-73 - Florian Kerber

, Dominik Teubert, Ulrike Meyer:
Covert remote syscall communication at kernel level: A SPOOKY backdoor. 74-81 - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier:

Gorille sniffs code similarities, the case study of qwerty versus regin. 82-89
Session 4 - The Measurement Problem: Inherent Limitations of Current Measurement Frameworks
- Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy:

Measuring the information security risk in an infrastructure. 93-100 - Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez

:
Measuring the health of antivirus ecosystems. 101-109 - Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks

, Ganesh Kumar Venayagamoorthy
:
Stealthy malware traffic - Not as innocent as it looks. 110-116
Session 5 - Mechanisms and Strategies to Detect Mobile Malware
- Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande

, Valérie Viet Triem Tong:
GroddDroid: a gorilla for triggering malicious behaviors. 119-127 - Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:

Clustering android malware families by http traffic. 128-135 - Ryan Johnson, Mohamed Elsabagh

, Angelos Stavrou
, Vincent Sritapan:
Targeted DoS on android: how to disable android in 10 seconds or less. 136-143 - John O'Brien, Kimmo Lehtonen:

Counterfeit mobile devices - the duck test. 144-151

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














