Login / Signup
MALWARE
2008
2012
2014
2018
2008
2018
Keyphrases
Publications
2018
Bander Alsulami
,
Spiros Mancoridis
Behavioral Malware Classification using Convolutional Recurrent Neural Networks.
MALWARE
(2018)
Colby Parker
,
Jeffrey Todd McDonald
,
Tom Johnsten
,
Ryan G. Benton
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models.
MALWARE
(2018)
Julien Piet
,
Blake Anderson
,
David A. McGrew
An In-Depth Study of Open-Source Command and Control Frameworks.
MALWARE
(2018)
William Fleshman
,
Edward Raff
,
Richard Zak
,
Mark McLean
,
Charles Nicholas
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus.
MALWARE
(2018)
Bingyin Zhao
,
Yingjie Lao
Resilience of Pruned Neural Network Against Poisoning Attack.
MALWARE
(2018)
Asaf Hecht
,
Adi Sagi
,
Yuval Elovici
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks.
MALWARE
(2018)
Rory Klein
,
Tyler Barkley
,
Weston Clizbe
,
Jennifer Bateman
,
Julian L. Rrushi
Model-driven Timing Consistency for Active Malware Redirection.
MALWARE
(2018)
Antoine Lemay
,
Sylvain P. Leblanc
Is eval () Evil : A study of JavaScript in PDF malware.
MALWARE
(2018)
Chang Wang
,
Zhaolong Zhang
,
Xiaoqi Jia
,
Donghai Tian
Binary Obfuscation Based Reassemble.
MALWARE
(2018)
Ananth A. Jillepalli
,
Daniel Conte de Leon
,
Brian K. Johnson
,
Yacine Chakhchoukh
,
Ibukun A. Oyewumi
,
Mohammad Ashrafuzzaman
,
Frederick T. Sheldon
,
Jim Alves-Foss
,
Michael A. Haney
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
MALWARE
(2018)
Danny Kim
,
Daniel Mirsky
,
Amir Majlesi-Kupaei
,
Rajeev Barua
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware.
MALWARE
(2018)
Michael James Michaud
,
Thomas R. Dean
,
Sylvain P. Leblanc
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems.
MALWARE
(2018)
Ni An
,
Alexander M. Duff
,
Mahshid Noorani
,
Steven Weber
,
Spiros Mancoridis
Malware Anomaly Detection on Virtual Assistants.
MALWARE
(2018)
Sai Medury
,
Anthony Skjellum
,
Richard R. Brooks
,
Lu Yu
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System.
MALWARE
(2018)
13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018
MALWARE
(2018)
Shahrear Iqbal
,
Mohammad Zulkernine
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android.
MALWARE
(2018)
George Kesidis
,
Yuquan Shan
,
Daniel Fleck
,
Angelos Stavrou
,
Takis Konstantopoulos
.
MALWARE
(2018)
Ramon P. Medina
,
Elijah B. Neundorfer
,
Radhouane Chouchane
,
Alfredo J. Perez
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution.
MALWARE
(2018)
Jonathan Oakley
,
Carl R. Worley
,
Lu Yu
,
Richard R. Brooks
,
Anthony Skjellum
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions.
MALWARE
(2018)
2017
12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017
MALWARE
(2017)
Lorenzo De Carli
,
Ruben Torres
,
Gaspar Modelo-Howard
,
Alok Tongaonkar
,
Somesh Jha
Kali: Scalable encryption fingerprinting in dynamic malware traces.
MALWARE
(2017)
Ni An
,
Alexander M. Duff
,
Gaurav Naik
,
Michalis Faloutsos
,
Steven Weber
,
Spiros Mancoridis
Behavioral anomaly detection of malware on home routers.
MALWARE
(2017)
Joel A. Dawson
,
Jeffrey Todd McDonald
,
Jordan Shropshire
,
Todd R. Andel
,
Patrick Luckett
,
Lee M. Hively
Rootkit detection through phase-space analysis of power voltage measurements.
MALWARE
(2017)
Lu Yu
,
Qing Wang
,
C. Geddings Barrineau
,
Jon Oakley
,
Richard R. Brooks
,
Kuang-Ching Wang
TARN: A SDN-based traffic analysis resistant network architecture.
MALWARE
(2017)
Arun Lakhotia
,
Paul Black
Mining malware secrets.
MALWARE
(2017)
Yuquan Shan
,
George Kesidis
,
Daniel Fleck
,
Angelos Stavrou
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
MALWARE
(2017)
Bander Alsulami
,
Avinash Srinivasan
,
Hunter Dong
,
Spiros Mancoridis
Lightweight behavioral malware detection for windows platforms.
MALWARE
(2017)
Mourad Leslous
,
Valérie Viet Triem Tong
,
Jean-François Lalande
,
Thomas Genet
GPFinder: Tracking the invisible in Android malware.
MALWARE
(2017)
Richard Zak
,
Edward Raff
,
Charles Nicholas
What can N-grams learn for malware detection?
MALWARE
(2017)
Yuejiang Wen
,
Yingjie Lao
Efficient fuzzy extractor implementations for PUF based authentication.
MALWARE
(2017)
Guillaume Bonfante
,
Hubert Godfroy
,
Jean-Yves Marion
A construction of a self-modifiying language with a formal correction proof.
MALWARE
(2017)
Luca Massarelli
,
Leonardo Aniello
,
Claudio Ciccotelli
,
Leonardo Querzoni
,
Daniele Ucci
,
Roberto Baldoni
Android malware family classification based on resource consumption over time.
MALWARE
(2017)
Julian L. Rrushi
Phantom I/O projector: Entrapping malware on machines in production.
MALWARE
(2017)
Michael Howard
,
Avi Pfeffer
,
Mukesh Dalai
,
Michael Reposa
Predicting signatures of future malware variants.
MALWARE
(2017)
Venkata S. Koganti
,
Mohammad Ashrafuzzaman
,
Ananth A. Jillepalli
,
Frederick T. Sheldon
A virtual testbed for security management of industrial control systems.
MALWARE
(2017)
Kurt Baumgartner
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?".
MALWARE
(2017)
2016
Dimitri Vitaliev
Keynote speaker.
MALWARE
(2016)
Paul Black
,
Joseph Opacki
Anti-analysis trends in banking malware.
MALWARE
(2016)
Luke Jones
,
Andrew J. Sellers
,
Martin C. Carlisle
CARDINAL: similarity analysis to defeat malware compiler variations.
MALWARE
(2016)
Yu Fu
,
Zhe Jia
,
Lu Yu
,
Xingsi Zhong
,
Richard R. Brooks
A covert data transport protocol.
MALWARE
(2016)
William Casey
,
Aaron Shelmire
Signature limits: an entire map of clone features and their discovery in nearly linear time.
MALWARE
(2016)
Asem Kitana
,
Issa Traoré
,
Isaac Woungang
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network.
MALWARE
(2016)
Md. Shahrear Iqbal
,
Mohammad Zulkernine
Zonedroid: control your droid through application zoning.
MALWARE
(2016)
Matthew Ping
,
Bander Alsulami
,
Spiros Mancoridis
On the effectiveness of application characteristics in the automatic classification of malware on smartphones.
MALWARE
(2016)
Lichao Sun
,
Zhiqiang Li
,
Qiben Yan
,
Witawas Srisa-an
,
Yu Pan
SigPID: significant permission identification for android malware detection.
MALWARE
(2016)
Su Mon Kywe
,
Yingjiu Li
,
Jason I. Hong
,
Cheng Yao
Dissecting developer policy violating apps: characterization and detection.
MALWARE
(2016)
Sergio Ivan Vargas Razo
,
Eleazar Aguirre Anaya
,
Ponciano Jorge Escamilla-Ambrosio
Reverse engineering with bioinformatics algorithms over a sound android covert channel.
MALWARE
(2016)
David Korczynski
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction.
MALWARE
(2016)
Jason Upchurch
,
Xiaobo Zhou
Malware provenance: code reuse detection in malicious software at scale.
MALWARE
(2016)
Angel M. Villegas
Function identification and recovery signature tool.
MALWARE
(2016)