Abstract is missing.
- Keynote SpeakerVern Paxson. 1 [doi]
- Using inherent command and control vulnerabilities to halt DDoS attacksLanier Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson. 3-10 [doi]
- Deep neural network based malware detection using two dimensional binary program featuresJoshua Saxe, Konstantin Berlin. 11-20 [doi]
- Run-time classification of malicious processes using system call analysisRaymond Canzanese, Spiros Mancoridis, Moshe Kam. 21-28 [doi]
- Variant: a malware similarity testing frameworkJason Upchurch, Xiaobo Zhou. 31-39 [doi]
- A framework for empirical evaluation of malware detection resilience against behavior obfuscationSebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner. 40-47 [doi]
- Automatically combining static malware detection techniquesDavid De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter. 48-55 [doi]
- Segmented sandboxing - A novel approach to Malware polymorphism detectionFernando C. Colon Osorio, Hongyuan Qiu, Anthony Arrott. 59-68 [doi]
- Sandboxing and reasoning on malware infection treesKrishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra. 69-73 [doi]
- Covert remote syscall communication at kernel level: A SPOOKY backdoorFlorian Kerber, Dominik Teubert, Ulrike Meyer. 74-81 [doi]
- Gorille sniffs code similarities, the case study of qwerty versus reginGuillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier. 82-89 [doi]
- Measuring the information security risk in an infrastructureFerenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy. 93-100 [doi]
- Measuring the health of antivirus ecosystemsFanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez. 101-109 [doi]
- Stealthy malware traffic - Not as innocent as it looksXingsi Zhong, Yu Fu, Lu Yu, Richard Brooks, Ganesh Kumar Venayagamoorthy. 110-116 [doi]
- GroddDroid: a gorilla for triggering malicious behaviorsA. Abraham, Radoniaina Andriatsimandefitra, A. Brunelat, Jean-François Lalande, V. Viet Triem Tong. 119-127 [doi]
- Clustering android malware families by http trafficMarco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto. 128-135 [doi]
- Targeted DoS on android: how to disable android in 10 seconds or lessRyan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan. 136-143 [doi]
- Counterfeit mobile devices - the duck testJohn O'Brien, Kimmo Lehtonen. 144-151 [doi]