default search action
8th MALWARE 2013: Fajardo, PR, USA
- 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2534-6
- Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici:
Noninvasive detection of anti-forensic malware. 1-10 - Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch:
Heuristic malware detection via basic block comparison. 11-18 - Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee:
Dynamic classification of packing algorithms for inspecting executables using entropy analysis. 19-26 - Fernando C. Colón Osorio, Ferenc Leitold, Dorottya Mike, Chris Pickard, Sveta Miladinov, Anthony Arrott:
Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach. 27-34 - Jeffrey Wu, Anthony Arrott:
Use-case-specific metrics for comparative testing of endpoint security products. 35-40 - Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan:
Synthesizing near-optimal malware specifications from suspicious behaviors. 41-50 - Joshua S. White, Jeanna N. Matthews:
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit. 51-58 - Mykola Protsenko, Tilo Müller:
PANDORA applies non-deterministic obfuscation randomly to Android. 59-67 - Jason Upchurch, Xiaobo Zhou:
First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. 68-76 - Rafael Fedler, Marcel Kulicke, Julian Schütte:
An antivirus API for Android malware recognition. 77-84 - Jacob Ouellette, Avi Pfeffer, Arun Lakhotia:
Countering malware evolution using cloud-based learning. 85-94 - Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla:
REcompile: A decompilation framework for static analysis of binaries. 95-102 - Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith:
Circumventing keyloggers and screendumps. 103-108 - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry:
Analysis and diversion of Duqu's driver. 109-115 - Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos:
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. 116-123 - Gen Lu, Karan Chadha, Saumya K. Debray:
A simple client-side defense against environment-dependent web-based malware. 124-131 - Hongyuan Qiu, Fernando C. Colón Osorio:
Static malware detection with Segmented Sandboxing. 132-141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.