researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Andrew Walenstein
Angelos Stavrou
Anthony Arrott
Arun Lakhotia
Aubrey-Derrick Schmidt
Elmar Gerhards-Padilla
Ferenc Leitold
Fernando C. Colon Osorio
Fernando C. Colón Osorio
Guillaume Bonfante
Heejo Lee
Jason Upchurch
Jean-Yves Marion
Jose Andre Morales
José M. Fernandez
Leonid Batyuk
Richard R. Brooks
Sahin Albayrak
Seyit Ahmet Çamtepe
Spiros Mancoridis
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
android
automatic
botnet
classification
code
conference
detection
international
malicious
malware
network
october
security
software
static
system
unwanted
usa
using
MALWARE (malware)
Editions
Publications
Viewing Publication 1 - 100 from 192
2018
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions
Jonathan Oakley 0001
,
Carl R. Worley
,
Lu Yu 0001
,
Richard R. Brooks
,
Anthony Skjellum
.
malware 2018
:
161-166
[doi]
13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018
IEEE,
2018.
[doi]
Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Bander Alsulami
,
Spiros Mancoridis
.
malware 2018
:
103-111
[doi]
Malware Anomaly Detection on Virtual Assistants
Ni An
,
Alexander M. Duff
,
Mahshid Noorani
,
Steven Weber
,
Spiros Mancoridis
.
malware 2018
:
124-131
[doi]
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
William Fleshman
,
Edward Raff
,
Richard Zak
,
Mark McLean
,
Charles Nicholas
.
malware 2018
:
3-12
[doi]
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks
Asaf Hecht
,
Adi Sagi
,
Yuval Elovici
.
malware 2018
:
87-94
[doi]
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android
Shahrear Iqbal
,
Mohammad Zulkernine
.
malware 2018
:
33-40
[doi]
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security
Ananth A. Jillepalli
,
Daniel Conte de Leon
,
Brian K. Johnson
,
Yacine Chakhchoukh
,
Ibukun A. Oyewumi
,
Mohammad Ashrafuzzaman
,
Frederick T. Sheldon
,
Jim Alves-Foss
,
Michael A. Haney
.
malware 2018
:
95-102
[doi]
*
George Kesidis
,
Yuquan Shan
,
Daniel Fleck
,
Angelos Stavrou
,
Takis Konstantopoulos
.
malware 2018
:
61-67
[doi]
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware
Danny Kim
,
Daniel Mirsky
,
Amir Majlesi-Kupaei
,
Rajeev Barua
.
malware 2018
:
115-123
[doi]
Model-driven Timing Consistency for Active Malware Redirection
Rory Klein
,
Tyler Barkley
,
Weston Clizbe
,
Jennifer Bateman
,
Julian L. Rrushi
.
malware 2018
:
132-141
[doi]
Is eval () Evil : A study of JavaScript in PDF malware
Antoine Lemay
,
Sylvain P. Leblanc
.
malware 2018
:
13-22
[doi]
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution
Ramon P. Medina
,
Elijah B. Neundorfer
,
Radhouane Chouchane
,
Alfredo Perez
.
malware 2018
:
41-48
[doi]
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System
Sai Medury
,
Anthony Skjellum
,
Richard R. Brooks
,
Lu Yu 0001
.
malware 2018
:
145-152
[doi]
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems
Michael James Michaud
,
Thomas R. Dean
,
Sylvain P. Leblanc
.
malware 2018
:
68-77
[doi]
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models
Colby Parker
,
Jeffrey Todd McDonald
,
Tom Johnsten
,
Ryan G. Benton
.
malware 2018
:
49-58
[doi]
An In-Depth Study of Open-Source Command and Control Frameworks
Julien Piet
,
Blake Anderson
,
David A. McGrew
.
malware 2018
:
23-30
[doi]
Binary Obfuscation Based Reassemble
Chang Wang
,
Zhaolong Zhang
,
Xiaoqi Jia
,
Donghai Tian
.
malware 2018
:
153-160
[doi]
Resilience of Pruned Neural Network Against Poisoning Attack
Bingyin Zhao
,
Yingjie Lao
.
malware 2018
:
78-83
[doi]
2017
12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017
IEEE,
2017.
[doi]
Lightweight behavioral malware detection for windows platforms
Bander Alsulami
,
Avinash Srinivasan
,
Hunter Dong
,
Spiros Mancoridis
.
malware 2017
:
75-81
[doi]
Behavioral anomaly detection of malware on home routers
Ni An
,
Alexander M. Duff
,
Gaurav Naik
,
Michalis Faloutsos
,
Steven Weber
,
Spiros Mancoridis
.
malware 2017
:
47-54
[doi]
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?"
Kurt Baumgartner
.
malware 2017
:
1
[doi]
A construction of a self-modifiying language with a formal correction proof
Guillaume Bonfante
,
Hubert Godfroy
,
Jean-Yves Marion
.
malware 2017
:
99-106
[doi]
Kali: Scalable encryption fingerprinting in dynamic malware traces
Lorenzo De Carli
,
Ruben Torres
,
Gaspar Modelo-Howard
,
Alok Tongaonkar
,
Somesh Jha
.
malware 2017
:
3-10
[doi]
Rootkit detection through phase-space analysis of power voltage measurements
Joel Dawson
,
Jeffrey Todd McDonald
,
Jordan Shropshire
,
Todd R. Andel
,
Patrick Luckett
,
Lee M. Hively
.
malware 2017
:
19-27
[doi]
Predicting signatures of future malware variants
Michael Howard
,
Avi Pfeffer
,
Mukesh Dalai
,
Michael Reposa
.
malware 2017
:
126-132
[doi]
A virtual testbed for security management of industrial control systems
Venkata S. Koganti
,
Mohammad Ashrafuzzaman
,
Ananth A. Jillepalli
,
Frederick T. Sheldon
.
malware 2017
:
85-90
[doi]
Mining malware secrets
Arun Lakhotia
,
Paul Black
.
malware 2017
:
11-18
[doi]
GPFinder: Tracking the invisible in Android malware
Mourad Leslous
,
Valérie Viet Triem Tong
,
Jean-François Lalande
,
Thomas Genet
.
malware 2017
:
39-46
[doi]
Android malware family classification based on resource consumption over time
Luca Massarelli
,
Leonardo Aniello
,
Claudio Ciccotelli
,
Leonardo Querzoni
,
Daniele Ucci
,
Roberto Baldoni
.
malware 2017
:
31-38
[doi]
Phantom I/O projector: Entrapping malware on machines in production
Julian L. Rrushi
.
malware 2017
:
57-66
[doi]
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems
Yuquan Shan
,
George Kesidis
,
Daniel Fleck
,
Angelos Stavrou
.
malware 2017
:
67-74
[doi]
Efficient fuzzy extractor implementations for PUF based authentication
Yuejiang Wen
,
Yingjie Lao
.
malware 2017
:
119-125
[doi]
TARN: A SDN-based traffic analysis resistant network architecture
Lu Yu
,
Qing Wang
,
C. Geddings Barrineau
,
Jon Oakley
,
Richard R. Brooks
,
Kuang-Ching Wang
.
malware 2017
:
91-98
[doi]
What can N-grams learn for malware detection?
Richard Zak
,
Edward Raff
,
Charles Nicholas
.
malware 2017
:
109-118
[doi]
2016
11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016
IEEE Computer Society,
2016.
[doi]
On periodic behavior of malware: experiments, opportunities and challenges
Huynh Ngoc Anh
,
Wee Keong Ng
,
Hoang Giang Do
.
malware 2016
:
85-92
[doi]
Anti-analysis trends in banking malware
Paul Black
,
Joseph Opacki
.
malware 2016
:
129-135
[doi]
Signature limits: an entire map of clone features and their discovery in nearly linear time
William Casey
,
Aaron Shelmire
.
malware 2016
:
147-156
[doi]
Automatic extraction of malicious behaviors
Khanh-Huu-The Dam
,
Tayssir Touili
.
malware 2016
:
47-56
[doi]
A covert data transport protocol
Yu Fu
,
Zhe Jia
,
Lu Yu
,
Xingsi Zhong
,
Richard R. Brooks
.
malware 2016
:
93-100
[doi]
Zonedroid: control your droid through application zoning
Md. Shahrear Iqbal
,
Mohammad Zulkernine
.
malware 2016
:
113-120
[doi]
CARDINAL: similarity analysis to defeat malware compiler variations
Luke Jones
,
Andrew Sellers
,
Martin C. Carlisle
.
malware 2016
:
39-46
[doi]
DySign: dynamic fingerprinting for the automatic detection of android malware
ElMouatez Billah Karbab
,
Mourad Debbabi
,
Saed Alrabaee
,
Djedjiga Mouheb
.
malware 2016
:
139-146
[doi]
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network
Asem Kitana
,
Issa Traoré
,
Isaac Woungang
.
malware 2016
:
20-30
[doi]
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction
David Korczynski
.
malware 2016
:
31-38
[doi]
Dissecting developer policy violating apps: characterization and detection
Su Mon Kywe
,
Yingjiu Li
,
Jason Hong
,
Cheng Yao
.
malware 2016
:
10-19
[doi]
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers
Salvador Morales-Ortega
,
Ponciano Jorge Escamilla-Ambrosio
,
Abraham Rodriguez-Mota
,
Lilian D. Coronado-De-Alba
.
malware 2016
:
67-74
[doi]
Message from the general program chair
Fernando C. Colón Osorio
.
malware 2016
:
[doi]
On the effectiveness of application characteristics in the automatic classification of malware on smartphones
Matthew Ping
,
Bander Alsulami
,
Spiros Mancoridis
.
malware 2016
:
75-82
[doi]
Reverse engineering with bioinformatics algorithms over a sound android covert channel
Sergio Ivan Vargas Razo
,
Eleazar Aguirre Anaya
,
Ponciano Jorge Escamilla-Ambrosio
.
malware 2016
:
3-9
[doi]
SigPID: significant permission identification for android malware detection
Lichao Sun
,
Zhiqiang Li
,
Qiben Yan
,
Witawas Srisa-an
,
Yu Pan
.
malware 2016
:
59-66
[doi]
Advanced transcriptase for JavaScript malware
Fabio Di Troia
,
Corrado Aaron Visaggio
,
Thomas H. Austin
,
Mark Stamp
.
malware 2016
:
121-128
[doi]
Malware provenance: code reuse detection in malicious software at scale
Jason Upchurch
,
Xiaobo Zhou
.
malware 2016
:
101-109
[doi]
Function identification and recovery signature tool
Angel M. Villegas
.
malware 2016
:
157-164
[doi]
Keynote speaker
Dimitri Vitaliev
.
malware 2016
:
[doi]
2015
Targeted DoS on android: how to disable android in 10 seconds or less
Ryan Johnson 0002
,
Mohamed Elsabagh
,
Angelos Stavrou
,
Vincent Sritapan
.
malware 2015
:
136-143
[doi]
10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015
IEEE,
2015.
[doi]
GroddDroid: a gorilla for triggering malicious behaviors
A. Abraham
,
Radoniaina Andriatsimandefitra
,
A. Brunelat
,
Jean-François Lalande
,
V. Viet Triem Tong
.
malware 2015
:
119-127
[doi]
Clustering android malware families by http traffic
Marco Aresu
,
Davide Ariu
,
Mansour Ahmadi
,
Davide Maiorca
,
Giorgio Giacinto
.
malware 2015
:
128-135
[doi]
A framework for empirical evaluation of malware detection resilience against behavior obfuscation
Sebastian Banescu
,
Tobias Wüchner
,
Aleieldin Salem
,
Marius Guggenmos
,
Martín Ochoa
,
Alexander Pretschner
.
malware 2015
:
40-47
[doi]
Gorille sniffs code similarities, the case study of qwerty versus regin
Guillaume Bonfante
,
Jean-Yves Marion
,
Fabrice Sabatier
.
malware 2015
:
82-89
[doi]
Run-time classification of malicious processes using system call analysis
Raymond Canzanese
,
Spiros Mancoridis
,
Moshe Kam
.
malware 2015
:
21-28
[doi]
Sandboxing and reasoning on malware infection trees
Krishnendu Ghosh
,
Jose Andre Morales
,
William Casey
,
Bud Mishra
.
malware 2015
:
69-73
[doi]
Covert remote syscall communication at kernel level: A SPOOKY backdoor
Florian Kerber
,
Dominik Teubert
,
Ulrike Meyer
.
malware 2015
:
74-81
[doi]
Measuring the information security risk in an infrastructure
Ferenc Leitold
,
Kalman Hadarics
,
Eszter Oroszi
,
Krisztina Gyorffy
.
malware 2015
:
93-100
[doi]
Automatically combining static malware detection techniques
David De Lille
,
Bart Coppens
,
Daan Raman
,
Bjorn De Sutter
.
malware 2015
:
48-55
[doi]
Measuring the health of antivirus ecosystems
Fanny Lalonde Lévesque
,
Anil Somayaji
,
Dennis Batchelder
,
José M. Fernandez
.
malware 2015
:
101-109
[doi]
Counterfeit mobile devices - the duck test
John O'Brien
,
Kimmo Lehtonen
.
malware 2015
:
144-151
[doi]
Segmented sandboxing - A novel approach to Malware polymorphism detection
Fernando C. Colon Osorio
,
Hongyuan Qiu
,
Anthony Arrott
.
malware 2015
:
59-68
[doi]
Keynote Speaker
Vern Paxson
.
malware 2015
:
1
[doi]
Deep neural network based malware detection using two dimensional binary program features
Joshua Saxe
,
Konstantin Berlin
.
malware 2015
:
11-20
[doi]
Variant: a malware similarity testing framework
Jason Upchurch
,
Xiaobo Zhou
.
malware 2015
:
31-39
[doi]
Using inherent command and control vulnerabilities to halt DDoS attacks
Lanier Watkins
,
Kurt Silberberg
,
Jose Andre Morales
,
William H. Robinson
.
malware 2015
:
3-10
[doi]
Stealthy malware traffic - Not as innocent as it looks
Xingsi Zhong
,
Yu Fu
,
Lu Yu
,
Richard Brooks
,
Ganesh Kumar Venayagamoorthy
.
malware 2015
:
110-116
[doi]
2014
9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014
IEEE,
2014.
[doi]
Host-based code injection attacks: A popular technique used by malware
Thomas Barabosch
,
Elmar Gerhards-Padilla
.
malware 2014
:
8-17
[doi]
Agent-based trace learning in a recommendation-verification system for cybersecurity
William Casey
,
Evan Wright
,
Jose Andre Morales
,
Michael Appel
,
Jeff Gennari
,
Bud Mishra
.
malware 2014
:
135-143
[doi]
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing
Andreas Clementi
,
Peter Stelzhammer
,
Fernando C. Colon Osorio
.
malware 2014
:
35-42
[doi]
Automatic construction of printable return-oriented programming payload
Wenbiao Ding
,
Xiao Xing
,
Ping Chen
,
Zhi-Xin
,
Bing Mao
.
malware 2014
:
18-25
[doi]
BoTGen: A new approach for in-lab generation of botnet datasets
Muhammad H. ElSheikh
,
Mohammed S. Gadelrab
,
Mahmoud A. Ghoneim
,
Mohsen Rashwan
.
malware 2014
:
76-84
[doi]
Bacterial quorum sensing for coordination of targeted malware
Mark E. Fioravanti
,
Richard Ford
.
malware 2014
:
101-108
[doi]
HoneyAgent: Detecting malicious Java applets by using dynamic analysis
Jan Gassen
,
Jonathan P. Chapman
.
malware 2014
:
109-117
[doi]
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
Mordechai Guri
,
Gabi Kedma
,
Assaf Kachlon
,
Yuval Elovici
.
malware 2014
:
58-67
[doi]
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android
Jihwan Jeong
,
Dongwon Seo
,
Chanyoung Lee
,
Jonghoon Kwon
,
Heejo Lee
,
John Milburn
.
malware 2014
:
50-57
[doi]
PsyBoG: Power spectral density analysis for detecting botnet groups
Jonghoon Kwon
,
JeongSik Kim
,
Jehyun Lee
,
Heejo Lee
,
Adrian Perrig
.
malware 2014
:
85-92
[doi]
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud
Ferenc Leitold
,
Anthony Arrott
,
Fernando C. Colon Osorio
.
malware 2014
:
40-49
[doi]
Risk prediction of malware victimization based on user behavior
Fanny Lalonde Lévesque
,
José M. Fernandez
,
Anil Somayaji
.
malware 2014
:
128-134
[doi]
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model
Joshua Saxe
,
Rafael Turner
,
Kristina Blokhin
.
malware 2014
:
68-75
[doi]
Identifying malware genera using the Jensen-Shannon distance between system call traces
Jeremy D. Seideman
,
Bilal Khan
,
Antonio Cesar Vargas
.
malware 2014
:
1-7
[doi]
Fighting banking botnets by exploiting inherent command and control vulnerabilities
Lanier Watkins
,
Christina Kawka
,
Cherita L. Corbett
,
William H. Robinson
.
malware 2014
:
93-100
[doi]
Protection against remote code execution exploits of popular applications in Windows
Jeffrey Wu
,
Anthony Arrott
,
Fernando C. Colon Osorio
.
malware 2014
:
26-31
[doi]
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files
Viviane Zwanger
,
Elmar Gerhards-Padilla
,
Michael Meier
.
malware 2014
:
118-127
[doi]
2013
8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013
IEEE,
2013.
[doi]
A simple client-side defense against environment-dependent web-based malware
Gen Lu
,
Karan Chadha
,
Saumya K. Debray
.
malware 2013
:
124-131
[doi]
Countering malware evolution using cloud-based learning
Jacob Ouellette
,
Avi Pfeffer
,
Arun Lakhotia
.
malware 2013
:
85-94
[doi]
PANDORA applies non-deterministic obfuscation randomly to Android
Mykola Protsenko
,
Tilo Müller
.
malware 2013
:
59-67
[doi]
Static malware detection with Segmented Sandboxing
Hongyuan Qiu
,
Fernando C. Colon Osorio
.
malware 2013
:
132-141
[doi]
REcompile: A decompilation framework for static analysis of binaries
Khaled Yakdan
,
Sebastian Eschweiler
,
Elmar Gerhards-Padilla
.
malware 2013
:
95-102
[doi]
Sign in
or
sign up
to see more results.