default search action
10th MALWARE 2015: Fajardo, PR, USA
- 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0317-4
- Vern Paxson:
Keynote Speaker. 1
Session 1 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson:
Using inherent command and control vulnerabilities to halt DDoS attacks. 3-10 - Joshua Saxe, Konstantin Berlin:
Deep neural network based malware detection using two dimensional binary program features. 11-20 - Raymond Canzanese, Spiros Mancoridis, Moshe Kam:
Run-time classification of malicious processes using system call analysis. 21-28
Session 2 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- Jason Upchurch, Xiaobo Zhou:
Variant: a malware similarity testing framework. 31-39 - Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner:
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. 40-47 - David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter:
Automatically combining static malware detection techniques. 48-55
Session 3 - Mechanisms and Strategies to Thwart Attacks
- Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott:
Segmented sandboxing - A novel approach to Malware polymorphism detection. 59-68 - Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra:
Sandboxing and reasoning on malware infection trees. 69-73 - Florian Kerber, Dominik Teubert, Ulrike Meyer:
Covert remote syscall communication at kernel level: A SPOOKY backdoor. 74-81 - Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier:
Gorille sniffs code similarities, the case study of qwerty versus regin. 82-89
Session 4 - The Measurement Problem: Inherent Limitations of Current Measurement Frameworks
- Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy:
Measuring the information security risk in an infrastructure. 93-100 - Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez:
Measuring the health of antivirus ecosystems. 101-109 - Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks, Ganesh Kumar Venayagamoorthy:
Stealthy malware traffic - Not as innocent as it looks. 110-116
Session 5 - Mechanisms and Strategies to Detect Mobile Malware
- Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong:
GroddDroid: a gorilla for triggering malicious behaviors. 119-127 - Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:
Clustering android malware families by http traffic. 128-135 - Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan:
Targeted DoS on android: how to disable android in 10 seconds or less. 136-143 - John O'Brien, Kimmo Lehtonen:
Counterfeit mobile devices - the duck test. 144-151
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.