Journal: Journal in Computer Virology

Volume 6, Issue 4

289 -- 315Frédéric Raynal, Guillaume Delugré, Damien Aumaitre. Malicious origami in PDF
317 -- 328Mikaël Salaün. Practical overview of a Xen covert channel
329 -- 342Guillaume Prigent, Florian Vichot, Fabrice Harrouet. IpMorph: fingerprinting spoofing unification
343 -- 351Julien Iguchi-Cartigny, Jean-Louis Lanet. Developing a Trojan applets in a smart card
353 -- 374Loïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin. ACPI and SMI handlers: some limits to trusted computing

Volume 6, Issue 3

181 -- 195Boris Lau, Vanja Svajcer. Measuring virtual machine detection in malware using DSD tracer
207 -- 237Jean-Baptiste Bedrune, Eric Filiol, Frédéric Raynal. Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
239 -- 259Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar. Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
261 -- 276Yoann Guillot, Alexandre Gazet. Automatic binary deobfuscation
277 -- 287Jean-Marie Borello, Eric Filiol, Ludovic Mé. From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques

Volume 6, Issue 2

91 -- 103Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Rokach. Auto-Sign: an automatic signature generator for high-speed malware filtering devices
105 -- 114Simon Kramer, Julian C. Bradfield. A general definition of malware
115 -- 122Hazem M. El-Bakry. Fast virus detection by using high speed time delay neural networks
123 -- 141Eric Uday Kumar. User-mode memory scanning on 32-bit & 64-bit windows
143 -- 159Frédéric Raynal, François Gaspard. Small treatise about e-manipulation for honest people
161 -- 180Jose Andre Morales, Peter J. Clarke, Yi Deng. Identification of file infecting viruses through detection of self-reference replication

Volume 6, Issue 1

1 -- 29Sébastien Tricaud, Philippe Saadé. Applied parallel coordinates for logs and network traffic attack analysis
31 -- 42Ezzat Kirmani, Cynthia S. Hood. Analysis of a scanning model of worm propagation
43 -- 55Safaa O. Al-Mamory, Hongli Zhang. New data mining technique to enhance IDS alarms quality
57 -- 64Humberto J. Abdelnur, Radu State, Olivier Festor. Advanced fuzzing in the VoIP space
65 -- 75Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera. Simulating malware with MAlSim
77 -- 90Alexandre Gazet. Comparative analysis of various ransomware virii