Volume 5, Number 1, February 2009
Volume 5, Number 2, May 2009
: CPU bugs, CPU backdoors and consequences on security.
Volume 5, Number 3, August 2009
Pavel V. Zbitskiy
: Code mutation techniques by means of formal grammars and automatons.
, Grant Malcolm
: Detection of metamorphic and virtualization-based malware using algebraic specification.
Volume 5, Number 4, November 2009
Duc T. Ha
, Hung Q. Ngo
: On the trade-off between speed and resiliency of Flash worms and similar malcodes.