![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/malware/malware2008.bht:"
@inproceedings{DBLP:conf/malware/BonfanteKM08, author = {Guillaume Bonfante and Matthieu Kaczmarek and Jean{-}Yves Marion}, title = {Morphological detection of malware}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690851}, doi = {10.1109/MALWARE.2008.4690851}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BonfanteKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ChouchaneWL08, author = {Mohamed R. Chouchane and Andrew Walenstein and Arun Lakhotia}, title = {Using Markov chains to filter machine-morphed variants of malicious programs}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690861}, doi = {10.1109/MALWARE.2008.4690861}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ChouchaneWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Craioveanu08, author = {Cristian Craioveanu}, title = {Server-side script polumorphism: Techniques of analysis and defense}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690852}, doi = {10.1109/MALWARE.2008.4690852}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Craioveanu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DavisFNM08, author = {Carlton R. Davis and Jos{\'{e}} M. Fernandez and Stephen Neville and John McHugh}, title = {Sybil attacks as a mitigation strategy against the Storm botnet}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {32--40}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690855}, doi = {10.1109/MALWARE.2008.4690855}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DavisFNM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/DittrichD08, author = {David Dittrich and Sven Dietrich}, title = {{P2P} as botnet command and control: {A} deeper insight}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {41--48}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690856}, doi = {10.1109/MALWARE.2008.4690856}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/DittrichD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/HarleyB08, author = {David Harley and Pierre{-}Marc Bureau}, title = {Drive-by downloads from the trenches}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {98--103}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690864}, doi = {10.1109/MALWARE.2008.4690864}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/HarleyB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LevyPK08, author = {Jamie Levy and Jaroslaw Paduch and Bilal Khan}, title = {Superimposing permutational covert channels onto reliable stream protocols}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {49--56}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690857}, doi = {10.1109/MALWARE.2008.4690857}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LevyPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/NazarioH08, author = {Jose Nazario and Thorsten Holz}, title = {As the net churns: Fast-flux botnet observations}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690854}, doi = {10.1109/MALWARE.2008.4690854}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/NazarioH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/NielsonCA08, author = {Jordan Nielson and Daniel Medeiros Nunes de Castro and John Aycock}, title = {Image spam - {ASCII} to the rescue!}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {65--68}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690859}, doi = {10.1109/MALWARE.2008.4690859}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/NielsonCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Osorio08, author = {Fernando C. Col{\'{o}}n Osorio}, title = {State of wireless security implementations in the United States and Europe - empirical data}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {92--97}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690863}, doi = {10.1109/MALWARE.2008.4690863}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Osorio08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SinhaBJ08, author = {Sushant Sinha and Michael D. Bailey and Farnam Jahanian}, title = {Shades of grey: On the effectiveness of reputation-based "blacklists"}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {57--64}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690858}, doi = {10.1109/MALWARE.2008.4690858}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SinhaBJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SunEB08, author = {Li Sun and Tim Ebringer and S. Boztag}, title = {An automatic anti-anti-VMware technique applicable for multi-stage packed malware}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690853}, doi = {10.1109/MALWARE.2008.4690853}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SunEB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ThomasJ08, author = {Vinoo Thomas and Nitin Jyoti}, title = {Combating file infectors on corporate networks}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {85--91}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690862}, doi = {10.1109/MALWARE.2008.4690862}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ThomasJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/TianBV08, author = {Ronghua Tian and Lynn Margaret Batten and Steven Versteeg}, title = {Function length as a tool for malware classification}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690860}, doi = {10.1109/MALWARE.2008.4690860}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/TianBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/malware/2008, title = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4686744/proceeding}, isbn = {978-1-4244-3288-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.