Abstract is missing.
- gExtractor: Towards Automated Extraction of Malware Deception ParametersMohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed. [doi]
- On-Device Detection via Anomalous Environmental FactorsAdam M. Gautier, Todd R. Andel, Ryan Benton. [doi]
- SysTaint: Assisting Reversing of Malicious Network CommunicationsGabriele Viglianisi, Michele Carminati, Mario Polino, Andrea Continella, Stefano Zanero. [doi]
- Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow GraphsJoonhyung Hwang, Taisook Han. [doi]
- DoSE: Deobfuscation based on Semantic EquivalenceRamtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh-Ha Le. [doi]
- Leave It to WeaverWilliam Mahoney, Joseph Franco, Greg Hoff, Jeffrey Todd McDonald. [doi]