


default search action
13th MALWARE 2018: Nantucket, MA, USA
- 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018. IEEE 2018, ISBN 978-1-7281-0155-2

Session 1 - Measurement: The Effectiveness of Anti-Malware Techniques
- William Fleshman, Edward Raff

, Richard Zak, Mark McLean, Charles Nicholas:
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. 3-12 - Antoine Lemay, Sylvain P. Leblanc

:
Is eval () Evil : A study of JavaScript in PDF malware. 13-22 - Julien Piet

, Blake Anderson, David A. McGrew:
An In-Depth Study of Open-Source Command and Control Frameworks. 23-30
Session 2 - Malware in the Times of Mobile Devices
- Shahrear Iqbal, Mohammad Zulkernine:

SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. 33-40 - Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez

:
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. 41-48 - Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton

:
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. 49-58
Session 3 - Botnets
- George Kesidis, Yuquan Shan, Daniel Fleck

, Angelos Stavrou
, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. 61-67 - Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc

:
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. 68-77 - Bingyin Zhao, Yingjie Lao:

Resilience of Pruned Neural Network Against Poisoning Attack. 78-83
Session 4 - Anti Malware Techniques
- Asaf Hecht, Adi Sagi, Yuval Elovici:

PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. 87-94 - Ananth A. Jillepalli

, Daniel Conte de Leon
, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman
, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney:
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. 95-102 - Bander Alsulami, Spiros Mancoridis:

Behavioral Malware Classification using Convolutional Recurrent Neural Networks. 103-111
Session 5 - Defense Techniques and Other Musings
- Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua:

A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. 115-123 - Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber, Spiros Mancoridis:

Malware Anomaly Detection on Virtual Assistants. 124-131 - Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi:

Model-driven Timing Consistency for Active Malware Redirection. 132-141
Session 6 - Anti Malware
- Sai Medury, Anthony Skjellum, Richard R. Brooks

, Lu Yu:
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. 145-152 - Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian:

Binary Obfuscation Based Reassemble. 153-160 - Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks

, Anthony Skjellum:
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. 161-166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














