Default Cover Image

2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)

Oct. 22 2013 to Oct. 24 2013

Fajardo, PR, USA

Table of Contents

[Front matter]Freely available from IEEE.pp. i-ix
Noninvasive detection of anti-forensic malwareFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Heuristic malware detection via basic block comparisonFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Dynamic classification of packing algorithms for inspecting executables using entropy analysisFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Use-case-specific metrics for comparative testing of endpoint security productsFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Synthesizing near-optimal malware specifications from suspicious behaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit KitFull-text access may be available. Sign in or learn about subscription options.pp. 51-58
PANDORA applies non-deterministic obfuscation randomly to AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 59-67
First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious softwareFull-text access may be available. Sign in or learn about subscription options.pp. 68-76
An antivirus API for Android malware recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 77-84
Countering malware evolution using cloud-based learningFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
REcompile: A decompilation framework for static analysis of binariesFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Circumventing keyloggers and screendumpsFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Analysis and diversion of Duqu's driverFull-text access may be available. Sign in or learn about subscription options.pp. 109-115
Highly resilient peer-to-peer botnets are here: An analysis of Gameover ZeusFull-text access may be available. Sign in or learn about subscription options.pp. 116-123
A simple client-side defense against environment-dependent web-based malwareFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
Static malware detection with Segmented SandboxingFull-text access may be available. Sign in or learn about subscription options.pp. 132-141
Showing 18 out of 18