Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MALWARE
MALWARE 2013
Generate Citations
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)
Oct. 22 2013 to Oct. 24 2013
Fajardo, PR, USA
Table of Contents
[Front matter]
Freely available from IEEE.
pp. i-ix
Noninvasive detection of anti-forensic malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mordehai Guri
,
Gabi Kedma
,
Tom Sela
,
Buky Carmeli
,
Amit Rosner
,
Yuval Elovici
Heuristic malware detection via basic block comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
Francis Adkins
,
Luke Jones
,
Martin Carlisle
,
Jason Upchurch
Dynamic classification of packing algorithms for inspecting executables using entropy analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Munkhbayar Bat-Erdene
,
Taebeom Kim
,
Hongzhe Li
,
Heejo Lee
Measuring the effectiveness of modern security products to detect and contain emerging threats — A consensus-based approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-34
by
Fernando C. Colon Osorio
,
Ferenc Leitold
,
Dorottya Mike
,
Chris Pickard
,
Sveta Miladinov
,
Anthony Arrott
Use-case-specific metrics for comparative testing of endpoint security products
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Jeffrey Wu
,
Anthony Arrott
Synthesizing near-optimal malware specifications from suspicious behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Somesh Jha
,
Matthew Fredrikson
,
Mihai Christodoresu
,
Reiner Sailer
,
Xifeng Yan
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-58
by
Joshua S. White
,
Jeanna N. Matthews
PANDORA applies non-deterministic obfuscation randomly to Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-67
by
Mykola Protsenko
,
Tilo Muller
First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-76
by
Jason Upchurch
,
Xiaobo Zhou
An antivirus API for Android malware recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-84
by
Rafael Fedler
,
Marcel Kulicke
,
Julian Schutte
Countering malware evolution using cloud-based learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-94
by
Jacob Ouellette
,
Avi Pfeffer
,
Arun Lakhotia
REcompile: A decompilation framework for static analysis of binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Khaled Yakdan
,
Sebastian Eschweiler
,
Elmar Gerhards-Padilla
Circumventing keyloggers and screendumps
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Karan Sapra
,
Benafsh Husain
,
Richard Brooks
,
Melissa Smith
Analysis and diversion of Duqu's driver
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-115
by
Guillaume Bonfante
,
Jean-Yves Marion
,
Fabrice Sabatier
,
Aurelien Thierry
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-123
by
Dennis Andriesse
,
Christian Rossow
,
Brett Stone-Gross
,
Daniel Plohmann
,
Herbert Bos
A simple client-side defense against environment-dependent web-based malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Gen Lu
,
Karan Chadha
,
Saumya Debray
Static malware detection with Segmented Sandboxing
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-141
by
Hongyuan Qiu
,
Fernando C. Colón Osorio
Showing 18 out of 18