Abstract is missing.
- "Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?"Kurt Baumgartner. 1 [doi]
- Kali: Scalable encryption fingerprinting in dynamic malware tracesLorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha. 3-10 [doi]
- Mining malware secretsArun Lakhotia, Paul Black. 11-18 [doi]
- Rootkit detection through phase-space analysis of power voltage measurementsJoel Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively. 19-27 [doi]
- Android malware family classification based on resource consumption over timeLuca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni. 31-38 [doi]
- GPFinder: Tracking the invisible in Android malwareMourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. 39-46 [doi]
- Behavioral anomaly detection of malware on home routersNi An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber, Spiros Mancoridis. 47-54 [doi]
- Phantom I/O projector: Entrapping malware on machines in productionJulian L. Rrushi. 57-66 [doi]
- Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systemsYuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou. 67-74 [doi]
- Lightweight behavioral malware detection for windows platformsBander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis. 75-81 [doi]
- A virtual testbed for security management of industrial control systemsVenkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon. 85-90 [doi]
- TARN: A SDN-based traffic analysis resistant network architectureLu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang. 91-98 [doi]
- A construction of a self-modifiying language with a formal correction proofGuillaume Bonfante, Hubert Godfroy, Jean-Yves Marion. 99-106 [doi]
- What can N-grams learn for malware detection?Richard Zak, Edward Raff, Charles Nicholas. 109-118 [doi]
- Efficient fuzzy extractor implementations for PUF based authenticationYuejiang Wen, Yingjie Lao. 119-125 [doi]
- Predicting signatures of future malware variantsMichael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa. 126-132 [doi]