default search action
13th MALWARE 2018: Nantucket, MA, USA
- 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018. IEEE 2018, ISBN 978-1-7281-0155-2
Session 1 - Measurement: The Effectiveness of Anti-Malware Techniques
- William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas:
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. 3-12 - Antoine Lemay, Sylvain P. Leblanc:
Is eval () Evil : A study of JavaScript in PDF malware. 13-22 - Julien Piet, Blake Anderson, David A. McGrew:
An In-Depth Study of Open-Source Command and Control Frameworks. 23-30
Session 2 - Malware in the Times of Mobile Devices
- Shahrear Iqbal, Mohammad Zulkernine:
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. 33-40 - Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez:
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. 41-48 - Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton:
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. 49-58
Session 3 - Botnets
- George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. 61-67 - Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc:
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. 68-77 - Bingyin Zhao, Yingjie Lao:
Resilience of Pruned Neural Network Against Poisoning Attack. 78-83
Session 4 - Anti Malware Techniques
- Asaf Hecht, Adi Sagi, Yuval Elovici:
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. 87-94 - Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney:
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. 95-102 - Bander Alsulami, Spiros Mancoridis:
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. 103-111
Session 5 - Defense Techniques and Other Musings
- Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua:
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. 115-123 - Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber, Spiros Mancoridis:
Malware Anomaly Detection on Virtual Assistants. 124-131 - Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi:
Model-driven Timing Consistency for Active Malware Redirection. 132-141
Session 6 - Anti Malware
- Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu:
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. 145-152 - Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian:
Binary Obfuscation Based Reassemble. 153-160 - Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Anthony Skjellum:
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. 161-166
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.