Abstract is missing.
- Identifying malware genera using the Jensen-Shannon distance between system call tracesJeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas. 1-7 [doi]
- Host-based code injection attacks: A popular technique used by malwareThomas Barabosch, Elmar Gerhards-Padilla. 8-17 [doi]
- Automatic construction of printable return-oriented programming payloadWenbiao Ding, Xiao Xing, Ping Chen, Zhi-Xin, Bing Mao. 18-25 [doi]
- Protection against remote code execution exploits of popular applications in WindowsJeffrey Wu, Anthony Arrott, Fernando C. Colon Osorio. 26-31 [doi]
- Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testingAndreas Clementi, Peter Stelzhammer, Fernando C. Colon Osorio. 35-42 [doi]
- Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraudFerenc Leitold, Anthony Arrott, Fernando C. Colon Osorio. 40-49 [doi]
- MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in AndroidJihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn. 50-57 [doi]
- AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequenciesMordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici. 58-67 [doi]
- CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning modelJoshua Saxe, Rafael Turner, Kristina Blokhin. 68-75 [doi]
- BoTGen: A new approach for in-lab generation of botnet datasetsMuhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen Rashwan. 76-84 [doi]
- PsyBoG: Power spectral density analysis for detecting botnet groupsJonghoon Kwon, JeongSik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig. 85-92 [doi]
- Fighting banking botnets by exploiting inherent command and control vulnerabilitiesLanier Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson. 93-100 [doi]
- Bacterial quorum sensing for coordination of targeted malwareMark E. Fioravanti, Richard Ford. 101-108 [doi]
- HoneyAgent: Detecting malicious Java applets by using dynamic analysisJan Gassen, Jonathan P. Chapman. 109-117 [doi]
- Codescanner: Detecting (Hidden) x86/x64 code in arbitrary filesViviane Zwanger, Elmar Gerhards-Padilla, Michael Meier. 118-127 [doi]
- Risk prediction of malware victimization based on user behaviorFanny Lalonde Lévesque, José M. Fernandez, Anil Somayaji. 128-134 [doi]
- Agent-based trace learning in a recommendation-verification system for cybersecurityWilliam Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra. 135-143 [doi]