default search action
12th MALWARE 2017: Fajardo, PR, USA
- 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1436-5
- Kurt Baumgartner:
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". 1
Session 1 - Emerging Threats and Malware Classification
- Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Kali: Scalable encryption fingerprinting in dynamic malware traces. 3-10 - Arun Lakhotia, Paul Black:
Mining malware secrets. 11-18 - Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively:
Rootkit detection through phase-space analysis of power voltage measurements. 19-27
Session 2 - Malware in the Times of Mobile Devices
- Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni:
Android malware family classification based on resource consumption over time. 31-38 - Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet:
GPFinder: Tracking the invisible in Android malware. 39-46 - Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber, Spiros Mancoridis:
Behavioral anomaly detection of malware on home routers. 47-54
Session 3 - Evolution of Our Defense Strategies ? How Can We Win?
- Julian L. Rrushi:
Phantom I/O projector: Entrapping malware on machines in production. 57-66 - Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. 67-74 - Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis:
Lightweight behavioral malware detection for windows platforms. 75-81
Session 4 - Malware, Industrial Control Systems and Defenses in the Age of "Internet of Things"
- Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon:
A virtual testbed for security management of industrial control systems. 85-90 - Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang:
TARN: A SDN-based traffic analysis resistant network architecture. 91-98 - Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion:
A construction of a self-modifiying language with a formal correction proof. 99-106
Session 6 - Theoretical Approaches for Malware Detection
- Richard Zak, Edward Raff, Charles Nicholas:
What can N-grams learn for malware detection? 109-118 - Yuejiang Wen, Yingjie Lao:
Efficient fuzzy extractor implementations for PUF based authentication. 119-125 - Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa:
Predicting signatures of future malware variants. 126-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.