Abstract is missing.
- GPU-assisted malwareGiorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. 1-6 [doi]
- Exploiting an I/OMMU vulnerabilityFernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte. 7-14 [doi]
- Header information in malware families and impact on automated classifiersAndrew Walenstein, Daniel J. Hefner, Jeffery Wichers. 15-22 [doi]
- Differentiating malware from cleanware using behavioural analysisRonghua Tian, Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg. 23-30 [doi]
- Evaluating detection and treatment effectiveness of commercial anti-malware programsJose Andre Morales, Ravi S. Sandhu, Shouhuai Xu. 31-38 [doi]
- Memory behavior-based automatic malware unpacking in stealth debugging environmentYuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh. 39-46 [doi]
- Unconditional self-modifying code elimination with dynamic compiler optimizationsIsabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka. 47-54 [doi]
- An Android Application Sandbox system for suspicious software detectionThomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak. 55-62 [doi]
- The Koobface botnet and the rise of social malwareKurt Thomas, David M. Nicol. 63-70 [doi]
- Rise of the iBots: Owning a telco networkCollin Mulliner, Jean-Pierre Seifert. 71-80 [doi]
- Overcoming the limitations in computer worm modelsFernando C. Colón Osorio, Frank S. Posluszny. 81-90 [doi]
- Multi-stage delivery of malwareMarco Ramilli, Matt Bishop. 91-97 [doi]
- Generic unpacking using entropy analysisGuhyeon Jeong, Euijin Choo, Joosuk Lee, M. Bat-Erdene, Heejo Lee. 98-105 [doi]
- Architecture for automation of malware analysisRodrigo Rubira Branco, Udi Shamir. 106-112 [doi]
- Detecting malware variants via function-call graph similarityShanhu Shang, Ning Zheng, Jian Xu, Ming Xu, Haiping Zhang. 113-120 [doi]