


default search action
12th MALWARE 2017: Fajardo, PR, USA
- 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1436-5

- Kurt Baumgartner:

"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". 1
Session 1 - Emerging Threats and Malware Classification
- Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:

Kali: Scalable encryption fingerprinting in dynamic malware traces. 3-10 - Arun Lakhotia, Paul Black:

Mining malware secrets. 11-18 - Joel A. Dawson

, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively:
Rootkit detection through phase-space analysis of power voltage measurements. 19-27
Session 2 - Malware in the Times of Mobile Devices
- Luca Massarelli, Leonardo Aniello

, Claudio Ciccotelli, Leonardo Querzoni
, Daniele Ucci
, Roberto Baldoni:
Android malware family classification based on resource consumption over time. 31-38 - Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet:

GPFinder: Tracking the invisible in Android malware. 39-46 - Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos

, Steven Weber, Spiros Mancoridis:
Behavioral anomaly detection of malware on home routers. 47-54
Session 3 - Evolution of Our Defense Strategies ? How Can We Win?
- Julian L. Rrushi:

Phantom I/O projector: Entrapping malware on machines in production. 57-66 - Yuquan Shan, George Kesidis, Daniel Fleck

, Angelos Stavrou
:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. 67-74 - Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis:

Lightweight behavioral malware detection for windows platforms. 75-81
Session 4 - Malware, Industrial Control Systems and Defenses in the Age of "Internet of Things"
- Venkata S. Koganti, Mohammad Ashrafuzzaman

, Ananth A. Jillepalli
, Frederick T. Sheldon:
A virtual testbed for security management of industrial control systems. 85-90 - Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks

, Kuang-Ching Wang
:
TARN: A SDN-based traffic analysis resistant network architecture. 91-98 - Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion:

A construction of a self-modifiying language with a formal correction proof. 99-106
Session 6 - Theoretical Approaches for Malware Detection
- Richard Zak, Edward Raff

, Charles Nicholas:
What can N-grams learn for malware detection? 109-118 - Yuejiang Wen

, Yingjie Lao:
Efficient fuzzy extractor implementations for PUF based authentication. 119-125 - Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa:

Predicting signatures of future malware variants. 126-132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














