Search dblp for Publications

export results for "toc:db/conf/malware/malware2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/malware/BaraboschG14,
  author       = {Thomas Barabosch and
                  Elmar Gerhards{-}Padilla},
  title        = {Host-based code injection attacks: {A} popular technique used by malware},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {8--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999410},
  doi          = {10.1109/MALWARE.2014.6999410},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BaraboschG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CaseyWMAGM14,
  author       = {William Casey and
                  Evan Wright and
                  Jose Andre Morales and
                  Michael Appel and
                  Jeff Gennari and
                  Bud Mishra},
  title        = {Agent-based trace learning in a recommendation-verification system
                  for cybersecurity},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {135--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999404},
  doi          = {10.1109/MALWARE.2014.6999404},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CaseyWMAGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ClementiSO14,
  author       = {Andreas Clementi and
                  Peter Stelzhammer and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Global and local prevalence weighting of missed attack sample impacts
                  for endpoint security product comparative detection testing},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {35--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999413},
  doi          = {10.1109/MALWARE.2014.6999413},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ClementiSO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DingXCXM14,
  author       = {Wenbiao Ding and
                  Xiao Xing and
                  Ping Chen and
                  Zhi Xin and
                  Bing Mao},
  title        = {Automatic construction of printable return-oriented programming payload},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {18--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999408},
  doi          = {10.1109/MALWARE.2014.6999408},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/DingXCXM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ElSheikhGGR14,
  author       = {Muhammad H. ElSheikh and
                  Mohammed S. Gadelrab and
                  Mahmoud A. Ghoneim and
                  Mohsen A. Rashwan},
  title        = {BoTGen: {A} new approach for in-lab generation of botnet datasets},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {76--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999406},
  doi          = {10.1109/MALWARE.2014.6999406},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/ElSheikhGGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FioravantiF14,
  author       = {Mark E. Fioravanti II and
                  Richard Ford},
  title        = {Bacterial quorum sensing for coordination of targeted malware},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {101--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999405},
  doi          = {10.1109/MALWARE.2014.6999405},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FioravantiF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GassenC14,
  author       = {Jan Gassen and
                  Jonathan P. Chapman},
  title        = {HoneyAgent: Detecting malicious Java applets by using dynamic analysis},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {109--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999402},
  doi          = {10.1109/MALWARE.2014.6999402},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GassenC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/GuriKKE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Assaf Kachlon and
                  Yuval Elovici},
  title        = {AirHopper: Bridging the air-gap between isolated networks and mobile
                  phones using radio frequencies},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999418},
  doi          = {10.1109/MALWARE.2014.6999418},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/GuriKKE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JeongSLKLM14,
  author       = {Jihwan Jeong and
                  Dongwon Seo and
                  Chanyoung Lee and
                  Jonghoon Kwon and
                  Heejo Lee and
                  John Milburn},
  title        = {MysteryChecker: Unpredictable attestation to detect repackaged malicious
                  applications in Android},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999415},
  doi          = {10.1109/MALWARE.2014.6999415},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/JeongSLKLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KwonKLLP14,
  author       = {Jonghoon Kwon and
                  Jeongsik Kim and
                  Jehyun Lee and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {PsyBoG: Power spectral density analysis for detecting botnet groups},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999414},
  doi          = {10.1109/MALWARE.2014.6999414},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KwonKLLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LeitoldAO14,
  author       = {Ferenc Leitold and
                  Anthony Arrott and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Combining commercial consensus and community crowd-sourced categorization
                  of web sites for integrity against phishing and other web fraud},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999407},
  doi          = {10.1109/MALWARE.2014.6999407},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LeitoldAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LevesqueFS14,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Jos{\'{e}} M. Fernandez and
                  Anil Somayaji},
  title        = {Risk prediction of malware victimization based on user behavior},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {128--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999412},
  doi          = {10.1109/MALWARE.2014.6999412},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LevesqueFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SaxeTB14,
  author       = {Joshua Saxe and
                  Rafael Turner and
                  Kristina Blokhin},
  title        = {CrowdSource: Automated inference of high level malware functionality
                  from low-level symbols using a crowd trained machine learning model},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999417},
  doi          = {10.1109/MALWARE.2014.6999417},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SaxeTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SeidemanKV14,
  author       = {Jeremy D. Seideman and
                  Bilal Khan and
                  Antonio Cesar Vargas},
  title        = {Identifying malware genera using the Jensen-Shannon distance between
                  system call traces},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999409},
  doi          = {10.1109/MALWARE.2014.6999409},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SeidemanKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WatkinsKCR14,
  author       = {Lanier A. Watkins and
                  Christina Kawka and
                  Cherita L. Corbett and
                  William H. Robinson},
  title        = {Fighting banking botnets by exploiting inherent command and control
                  vulnerabilities},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999411},
  doi          = {10.1109/MALWARE.2014.6999411},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WatkinsKCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/WuAO14,
  author       = {Jeffrey Wu and
                  Anthony Arrott and
                  Fernando C. Col{\'{o}}n Osorio},
  title        = {Protection against remote code execution exploits of popular applications
                  in Windows},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {26--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999416},
  doi          = {10.1109/MALWARE.2014.6999416},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/WuAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZwangerGM14,
  author       = {Viviane Zwanger and
                  Elmar Gerhards{-}Padilla and
                  Michael Meier},
  title        = {Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files},
  booktitle    = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  pages        = {118--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MALWARE.2014.6999403},
  doi          = {10.1109/MALWARE.2014.6999403},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/ZwangerGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2014,
  title        = {9th International Conference on Malicious and Unwanted Software: The
                  Americas {MALWARE} 2014, Fajardo, PR, USA, October 28-30, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6987537/proceeding},
  isbn         = {978-1-4799-7328-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}