Abstract is missing.
- Using File Relationships in Malware ClassificationNikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu. 1-20 [doi]
- Understanding DMA MalwarePatrick Stewin, Iurii Bystrov. 21-41 [doi]
- Large-Scale Analysis of Malware DownloadersChristian Rossow, Christian J. Dietrich, Herbert Bos. 42-61 [doi]
- Juxtapp: A Scalable System for Detecting Code Reuse among Android ApplicationsSteve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song. 62-81 [doi]
- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus SystemsMin Zheng, Patrick P. C. Lee, John C. S. Lui. 82-101 [doi]
- A Static, Packer-Agnostic Filter to Detect Similar Malware SamplesGrégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna. 102-122 [doi]
- Experiments with Malware VisualizationYongzheng Wu, Roland H. C. Yap. 123-133 [doi]
- Tracking Memory Writes for Malware Classification and Code Reuse IdentificationAndré Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna. 134-143 [doi]
- System-Level Support for Intrusion RecoveryAndrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos. 144-163 [doi]
- NetGator: Malware Detection Using Program Interactive ChallengesBrian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou. 164-183 [doi]
- SmartProxy: Secure Smartphone-Assisted Login on Compromised MachinesJohannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz. 184-203 [doi]
- BISSAM: Automatic Vulnerability Identification of Office DocumentsThomas Schreck, Stefan Berger, Jan Göbel. 204-213 [doi]
- Self-organized Collaboration of Distributed IDS SensorsKarel Bartos, Martin Rehák, Michal Svoboda. 214-231 [doi]
- Shedding Light on Log Correlation in Network Forensics AnalysisElias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos. 232-241 [doi]