Search dblp for Publications

export results for "toc:db/conf/malware/malware2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/malware/AdkinsJCU13,
  author       = {Francis Adkins and
                  Luke Jones and
                  Martin C. Carlisle and
                  Jason Upchurch},
  title        = {Heuristic malware detection via basic block comparison},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703680},
  doi          = {10.1109/MALWARE.2013.6703680},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AdkinsJCU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AndriesseRSPB13,
  author       = {Dennis Andriesse and
                  Christian Rossow and
                  Brett Stone{-}Gross and
                  Daniel Plohmann and
                  Herbert Bos},
  title        = {Highly resilient peer-to-peer botnets are here: An analysis of Gameover
                  Zeus},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {116--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703693},
  doi          = {10.1109/MALWARE.2013.6703693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AndriesseRSPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Bat-ErdeneKLL13,
  author       = {Munkhbayar Bat{-}Erdene and
                  Taebeom Kim and
                  Hongzhe Li and
                  Heejo Lee},
  title        = {Dynamic classification of packing algorithms for inspecting executables
                  using entropy analysis},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703681},
  doi          = {10.1109/MALWARE.2013.6703681},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Bat-ErdeneKLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BonfanteMST13,
  author       = {Guillaume Bonfante and
                  Jean{-}Yves Marion and
                  Fabrice Sabatier and
                  Aur{\'{e}}lien Thierry},
  title        = {Analysis and diversion of Duqu's driver},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {109--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703692},
  doi          = {10.1109/MALWARE.2013.6703692},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteMST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FedlerKS13,
  author       = {Rafael Fedler and
                  Marcel Kulicke and
                  Julian Sch{\"{u}}tte},
  title        = {An antivirus {API} for Android malware recognition},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703688},
  doi          = {10.1109/MALWARE.2013.6703688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FedlerKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GuriKSCRE13,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Tom Sela and
                  Buky Carmeli and
                  Amit Rosner and
                  Yuval Elovici},
  title        = {Noninvasive detection of anti-forensic malware},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703679},
  doi          = {10.1109/MALWARE.2013.6703679},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GuriKSCRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JhaFCSY13,
  author       = {Somesh Jha and
                  Matthew Fredrikson and
                  Mihai Christodorescu and
                  Reiner Sailer and
                  Xifeng Yan},
  title        = {Synthesizing near-optimal malware specifications from suspicious behaviors},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703684},
  doi          = {10.1109/MALWARE.2013.6703684},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LuCD13,
  author       = {Gen Lu and
                  Karan Chadha and
                  Saumya K. Debray},
  title        = {A simple client-side defense against environment-dependent web-based
                  malware},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {124--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703694},
  doi          = {10.1109/MALWARE.2013.6703694},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LuCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OsorioLMPMA13,
  author       = {Fernando C. Col{\'{o}}n Osorio and
                  Ferenc Leitold and
                  Dorottya Mike and
                  Chris Pickard and
                  Sveta Miladinov and
                  Anthony Arrott},
  title        = {Measuring the effectiveness of modern security products to detect
                  and contain emerging threats - {A} consensus-based approach},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {27--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703682},
  doi          = {10.1109/MALWARE.2013.6703682},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OsorioLMPMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OuellettePL13,
  author       = {Jacob Ouellette and
                  Avi Pfeffer and
                  Arun Lakhotia},
  title        = {Countering malware evolution using cloud-based learning},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703689},
  doi          = {10.1109/MALWARE.2013.6703689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/OuellettePL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ProtsenkoM13,
  author       = {Mykola Protsenko and
                  Tilo M{\"{u}}ller},
  title        = {{PANDORA} applies non-deterministic obfuscation randomly to Android},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {59--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703686},
  doi          = {10.1109/MALWARE.2013.6703686},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ProtsenkoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/QiuO13,
  author       = {Hongyuan Qiu and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Static malware detection with Segmented Sandboxing},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {132--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703695},
  doi          = {10.1109/MALWARE.2013.6703695},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/QiuO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SapraHBS13,
  author       = {Karan Sapra and
                  Benafsh Husain and
                  Richard R. Brooks and
                  Melissa C. Smith},
  title        = {Circumventing keyloggers and screendumps},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {103--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703691},
  doi          = {10.1109/MALWARE.2013.6703691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SapraHBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/UpchurchZ13,
  author       = {Jason Upchurch and
                  Xiaobo Zhou},
  title        = {First byte: Force-based clustering of filtered block N-grams to detect
                  code reuse in malicious software},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {68--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703687},
  doi          = {10.1109/MALWARE.2013.6703687},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/UpchurchZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WhiteM13,
  author       = {Joshua S. White and
                  Jeanna N. Matthews},
  title        = {It's you on photo?: Automatic detection of Twitter accounts infected
                  with the Blackhole Exploit Kit},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703685},
  doi          = {10.1109/MALWARE.2013.6703685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WhiteM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WuA13,
  author       = {Jeffrey Wu and
                  Anthony Arrott},
  title        = {Use-case-specific metrics for comparative testing of endpoint security
                  products},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703683},
  doi          = {10.1109/MALWARE.2013.6703683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WuA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/YakdanEG13,
  author       = {Khaled Yakdan and
                  Sebastian Eschweiler and
                  Elmar Gerhards{-}Padilla},
  title        = {REcompile: {A} decompilation framework for static analysis of binaries},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703690},
  doi          = {10.1109/MALWARE.2013.6703690},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/YakdanEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2013,
  title        = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6693154/proceeding},
  isbn         = {978-1-4799-2534-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics