Journal: Journal in Computer Virology

Volume 8, Issue 1-2

1 -- 13Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu. Shadow attacks: automatically evading system-call-behavior based malware detection
15 -- 27Eddy Deligne. ARDrone corruption
29 -- 36Vincent Guyot. Smart card, the stealth leaker
37 -- 52Neha Runwal, Richard M. Low, Mark Stamp. Opcode graph similarity and metamorphic detection
53 -- 60John Aycock. What's in a name. . . generator?
61 -- 71Axelle Apvrille, Tim Strazzere. Reducing the window of opportunity for Android malware Gotta catch 'em all