Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Julien Piet, Blake Anderson, David A. McGrew |
An In-Depth Study of Open-Source Command and Control Frameworks. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney |
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc |
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua |
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum |
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian |
Binary Obfuscation Based Reassemble. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001 |
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Asaf Hecht, Adi Sagi, Yuval Elovici |
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi |
Model-driven Timing Consistency for Active Malware Redirection. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Lemay, Sylvain P. Leblanc |
Is eval () Evil : A study of JavaScript in PDF malware. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018 |
MALWARE |
2018 |
DBLP BibTeX RDF |
|
1 | George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos |
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber 0001, Spiros Mancoridis |
Malware Anomaly Detection on Virtual Assistants. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shahrear Iqbal, Mohammad Zulkernine |
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bander Alsulami, Spiros Mancoridis |
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton |
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bingyin Zhao, Yingjie Lao |
Resilience of Pruned Neural Network Against Poisoning Attack. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez |
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis |
Lightweight behavioral malware detection for windows platforms. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber 0001, Spiros Mancoridis |
Behavioral anomaly detection of malware on home routers. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet |
GPFinder: Tracking the invisible in Android malware. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arun Lakhotia, Paul Black |
Mining malware secrets. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou |
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Qing Wang 0047, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang |
TARN: A SDN-based traffic analysis resistant network architecture. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa |
Predicting signatures of future malware variants. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni |
Android malware family classification based on resource consumption over time. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017 |
MALWARE |
2017 |
DBLP BibTeX RDF |
|
1 | Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively |
Rootkit detection through phase-space analysis of power voltage measurements. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kurt Baumgartner |
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Julian L. Rrushi |
Phantom I/O projector: Entrapping malware on machines in production. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha |
Kali: Scalable encryption fingerprinting in dynamic malware traces. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon |
A virtual testbed for security management of industrial control systems. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion |
A construction of a self-modifiying language with a formal correction proof. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuejiang Wen, Yingjie Lao |
Efficient fuzzy extractor implementations for PUF based authentication. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard Zak, Edward Raff, Charles Nicholas |
What can N-grams learn for malware detection? |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Angel M. Villegas |
Function identification and recovery signature tool. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fernando C. Colón Osorio |
Message from the general program chair. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do |
On periodic behavior of malware: experiments, opportunities and challenges. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb |
DySign: dynamic fingerprinting for the automatic detection of android malware. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dimitri Vitaliev |
Keynote speaker. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lichao Sun 0001, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan |
SigPID: significant permission identification for android malware detection. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Md. Shahrear Iqbal, Mohammad Zulkernine |
Zonedroid: control your droid through application zoning. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Luke Jones, Andrew J. Sellers, Martin C. Carlisle |
CARDINAL: similarity analysis to defeat malware compiler variations. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 |
Advanced transcriptase for JavaScript malware. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Ping, Bander Alsulami, Spiros Mancoridis |
On the effectiveness of application characteristics in the automatic classification of malware on smartphones. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Korczynski |
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio |
Reverse engineering with bioinformatics algorithms over a sound android covert channel. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jason Upchurch, Xiaobo Zhou 0002 |
Malware provenance: code reuse detection in malicious software at scale. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao |
Dissecting developer policy violating apps: characterization and detection. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | William Casey, Aaron Shelmire |
Signature limits: an entire map of clone features and their discovery in nearly linear time. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yu Fu 0005, Zhe Jia, Lu Yu 0001, Xingsi Zhong, Richard R. Brooks |
A covert data transport protocol. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Asem Kitana, Issa Traoré, Isaac Woungang |
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paul Black, Joseph Opacki |
Anti-analysis trends in banking malware. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba |
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khanh-Huu-The Dam, Tayssir Touili |
Automatic extraction of malicious behaviors. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016 |
MALWARE |
2016 |
DBLP BibTeX RDF |
|
1 | Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson |
Using inherent command and control vulnerabilities to halt DDoS attacks. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner |
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott |
Segmented sandboxing - A novel approach to Malware polymorphism detection. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 |
Measuring the health of antivirus ecosystems. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raymond Canzanese, Spiros Mancoridis, Moshe Kam |
Run-time classification of malicious processes using system call analysis. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto |
Clustering android malware families by http traffic. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vern Paxson |
Keynote Speaker. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong |
GroddDroid: a gorilla for triggering malicious behaviors. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David De Lille, Bart Coppens 0001, Daan Raman, Bjorn De Sutter |
Automatically combining static malware detection techniques. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | John O'Brien, Kimmo Lehtonen |
Counterfeit mobile devices - the duck test. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra |
Sandboxing and reasoning on malware infection trees. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerber, Dominik Teubert, Ulrike Meyer |
Covert remote syscall communication at kernel level: A SPOOKY backdoor. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy |
Measuring the information security risk in an infrastructure. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015 |
MALWARE |
2015 |
DBLP BibTeX RDF |
|
1 | Xingsi Zhong, Yu Fu 0005, Lu Yu 0001, Richard R. Brooks, Ganesh Kumar Venayagamoorthy |
Stealthy malware traffic - Not as innocent as it looks. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Saxe, Konstantin Berlin |
Deep neural network based malware detection using two dimensional binary program features. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan |
Targeted DoS on android: how to disable android in 10 seconds or less. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jason Upchurch, Xiaobo Zhou 0002 |
Variant: a malware similarity testing framework. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier |
Gorille sniffs code similarities, the case study of qwerty versus regin. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Barabosch, Elmar Gerhards-Padilla |
Host-based code injection attacks: A popular technique used by malware. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig |
PsyBoG: Power spectral density analysis for detecting botnet groups. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra |
Agent-based trace learning in a recommendation-verification system for cybersecurity. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mark E. Fioravanti II, Richard Ford |
Bacterial quorum sensing for coordination of targeted malware. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn |
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier 0001 |
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio |
Protection against remote code execution exploits of popular applications in Windows. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan |
BoTGen: A new approach for in-lab generation of botnet datasets. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fanny Lalonde Lévesque, José M. Fernandez 0001, Anil Somayaji |
Risk prediction of malware victimization based on user behavior. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Saxe, Rafael Turner, Kristina Blokhin |
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014 |
MALWARE |
2014 |
DBLP BibTeX RDF |
|
1 | Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson |
Fighting banking botnets by exploiting inherent command and control vulnerabilities. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici |
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao |
Automatic construction of printable return-oriented programming payload. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio |
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio |
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas |
Identifying malware genera using the Jensen-Shannon distance between system call traces. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jan Gassen, Jonathan P. Chapman |
HoneyAgent: Detecting malicious Java applets by using dynamic analysis. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch |
Heuristic malware detection via basic block comparison. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos |
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Analysis and diversion of Duqu's driver. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan |
Synthesizing near-optimal malware specifications from suspicious behaviors. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongyuan Qiu, Fernando C. Colón Osorio |
Static malware detection with Segmented Sandboxing. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gen Lu, Karan Chadha, Saumya K. Debray |
A simple client-side defense against environment-dependent web-based malware. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|