Abstract is missing.
- Rogue software: Protection against potentially unwanted applicationsChris Pickard, Sveta Miladinov. 1-8 [doi]
- The power of obfuscation techniques in malicious JavaScript code: A measurement studyWei Xu, Fangfang Zhang, Sencun Zhu. 9-16 [doi]
- A transformation-based model of malware derivationAndrew Walenstein, Arun Lakhotia. 17-25 [doi]
- Analysis and detection of malicious data exfiltration in web trafficAreej Al-Bataineh, Gregory White. 26-31 [doi]
- Circumventing cryptography in virtualized environmentsBrian Hay, Kara L. Nance. 32-38 [doi]
- Malware Analysis and attribution using Genetic InformationAvi Pfeffer, Catherine Call, John Chamberlain, Lee Kellogg, Jacob Ouellette, Terry Patten, Greg Zacharias, Arun Lakhotia, Suresh Golconda, John Bay, Robert Hall, Daniel Scofield. 39-45 [doi]
- CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malwareFelix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla. 46-53 [doi]
- Component protection metrics for security product development: I. AV-TEST Full Product TestsAndreas Marx, Alice Decker, Anthony Arrott. 54-61 [doi]
- Measuring security risk in the cloud-enabled enterpriseFerenc Leitold, Kalman Hadarics. 62-66 [doi]
- Click-fraud monetizing malware: A survey and case studyTommy Blizard, Nikola Livic. 67-72 [doi]
- A trusted ecosystem for Android applications based on context-aware access controlMarkus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak. 73-78 [doi]
- Smartphone malware detection: From a survey towards taxonomyAbdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 79-86 [doi]
- Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devicesJohn Spaulding, Alyssa Krauss, Avinash Srinivasan. 87-93 [doi]
- A scalable search index for binary filesWesley Jin, Charles Hines, Cory Cohen, Priya Narasimhan. 94-103 [doi]
- BinGraph: Discovering mutant malware using hierarchical semantic signaturesJonghoon Kwon, Heejo Lee. 104-111 [doi]
- Code synchronization by morphological analysisGuillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurelien Thierry. 112-119 [doi]
- "TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint trackingZhibo Zhao, Fernando C. Colón Osorio. 135-143 [doi]