


default search action
11th MALWARE 2016: Fajardo, PR, USA
- 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4542-6

- Fernando C. Colón Osorio:

Message from the general program chair. - Dimitri Vitaliev:

Keynote speaker.
Session 1 - Emerging Threats and Malware Classification
- Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio

:
Reverse engineering with bioinformatics algorithms over a sound android covert channel. 3-9 - Su Mon Kywe, Yingjiu Li, Jason I. Hong

, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. 10-19 - Asem Kitana, Issa Traoré, Isaac Woungang:

Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. 20-30
Session 2 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- David Korczynski:

RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. 31-38 - Luke Jones, Andrew J. Sellers, Martin C. Carlisle

:
CARDINAL: similarity analysis to defeat malware compiler variations. 39-46 - Khanh-Huu-The Dam

, Tayssir Touili:
Automatic extraction of malicious behaviors. 47-56
Session 3 - Mobile Malware, Detection and Thwarting
- Lichao Sun

, Zhiqiang Li, Qiben Yan
, Witawas Srisa-an
, Yu Pan:
SigPID: significant permission identification for android malware detection. 59-66 - Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio

, Abraham Rodriguez-Mota
, Lilian D. Coronado-De-Alba:
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. 67-74 - Matthew Ping, Bander Alsulami, Spiros Mancoridis:

On the effectiveness of application characteristics in the automatic classification of malware on smartphones. 75-82
Session 4 - Offense, Defense, and Malware Provenance
- Huynh Ngoc Anh, Wee Keong Ng

, Hoang Giang Do:
On periodic behavior of malware: experiments, opportunities and challenges. 85-92 - Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks

:
A covert data transport protocol. 93-100 - Jason Upchurch, Xiaobo Zhou:

Malware provenance: code reuse detection in malicious software at scale. 101-109
Session 5 - Malware: The Emergence of New Threats and the Analysis of Old Friends
- Md. Shahrear Iqbal, Mohammad Zulkernine:

Zonedroid: control your droid through application zoning. 113-120 - Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin

, Mark Stamp
:
Advanced transcriptase for JavaScript malware. 121-128 - Paul Black

, Joseph Opacki:
Anti-analysis trends in banking malware. 129-135
Session 6 - Mechanisms and Strategies to Detect Mobile Malware
- ElMouatez Billah Karbab, Mourad Debbabi

, Saed Alrabaee, Djedjiga Mouheb
:
DySign: dynamic fingerprinting for the automatic detection of android malware. 139-146 - William Casey, Aaron Shelmire:

Signature limits: an entire map of clone features and their discovery in nearly linear time. 147-156 - Angel M. Villegas:

Function identification and recovery signature tool. 157-164

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














