default search action
11th MALWARE 2016: Fajardo, PR, USA
- 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4542-6
- Fernando C. Colón Osorio:
Message from the general program chair. - Dimitri Vitaliev:
Keynote speaker.
Session 1 - Emerging Threats and Malware Classification
- Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio:
Reverse engineering with bioinformatics algorithms over a sound android covert channel. 3-9 - Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. 10-19 - Asem Kitana, Issa Traoré, Isaac Woungang:
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. 20-30
Session 2 - Broad Spectrum Malware, Defense Strategies and Mechanisms
- David Korczynski:
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. 31-38 - Luke Jones, Andrew J. Sellers, Martin C. Carlisle:
CARDINAL: similarity analysis to defeat malware compiler variations. 39-46 - Khanh-Huu-The Dam, Tayssir Touili:
Automatic extraction of malicious behaviors. 47-56
Session 3 - Mobile Malware, Detection and Thwarting
- Lichao Sun, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan:
SigPID: significant permission identification for android malware detection. 59-66 - Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba:
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. 67-74 - Matthew Ping, Bander Alsulami, Spiros Mancoridis:
On the effectiveness of application characteristics in the automatic classification of malware on smartphones. 75-82
Session 4 - Offense, Defense, and Malware Provenance
- Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do:
On periodic behavior of malware: experiments, opportunities and challenges. 85-92 - Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks:
A covert data transport protocol. 93-100 - Jason Upchurch, Xiaobo Zhou:
Malware provenance: code reuse detection in malicious software at scale. 101-109
Session 5 - Malware: The Emergence of New Threats and the Analysis of Old Friends
- Md. Shahrear Iqbal, Mohammad Zulkernine:
Zonedroid: control your droid through application zoning. 113-120 - Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Advanced transcriptase for JavaScript malware. 121-128 - Paul Black, Joseph Opacki:
Anti-analysis trends in banking malware. 129-135
Session 6 - Mechanisms and Strategies to Detect Mobile Malware
- ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. 139-146 - William Casey, Aaron Shelmire:
Signature limits: an entire map of clone features and their discovery in nearly linear time. 147-156 - Angel M. Villegas:
Function identification and recovery signature tool. 157-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.