Abstract is missing.
- Keynote speakerDimitri Vitaliev. [doi]
- Message from the general program chairFernando C. Colón Osorio. [doi]
- Reverse engineering with bioinformatics algorithms over a sound android covert channelSergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio. 3-9 [doi]
- Dissecting developer policy violating apps: characterization and detectionSu Mon Kywe, Yingjiu Li, Jason Hong, Cheng Yao. 10-19 [doi]
- Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE networkAsem Kitana, Issa Traoré, Isaac Woungang. 20-30 [doi]
- RePEconstruct: reconstructing binaries with self-modifying code and import address table destructionDavid Korczynski. 31-38 [doi]
- CARDINAL: similarity analysis to defeat malware compiler variationsLuke Jones, Andrew Sellers, Martin C. Carlisle. 39-46 [doi]
- Automatic extraction of malicious behaviorsKhanh-Huu-The Dam, Tayssir Touili. 47-56 [doi]
- SigPID: significant permission identification for android malware detectionLichao Sun, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan. 59-66 [doi]
- Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiersSalvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba. 67-74 [doi]
- On the effectiveness of application characteristics in the automatic classification of malware on smartphonesMatthew Ping, Bander Alsulami, Spiros Mancoridis. 75-82 [doi]
- On periodic behavior of malware: experiments, opportunities and challengesHuynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do. 85-92 [doi]
- A covert data transport protocolYu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks. 93-100 [doi]
- Malware provenance: code reuse detection in malicious software at scaleJason Upchurch, Xiaobo Zhou. 101-109 [doi]
- Zonedroid: control your droid through application zoningMd. Shahrear Iqbal, Mohammad Zulkernine. 113-120 [doi]
- Advanced transcriptase for JavaScript malwareFabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp. 121-128 [doi]
- Anti-analysis trends in banking malwarePaul Black, Joseph Opacki. 129-135 [doi]
- DySign: dynamic fingerprinting for the automatic detection of android malwareElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb. 139-146 [doi]
- Signature limits: an entire map of clone features and their discovery in nearly linear timeWilliam Casey, Aaron Shelmire. 147-156 [doi]
- Function identification and recovery signature toolAngel M. Villegas. 157-164 [doi]