default search action
5th MALWARE 2010: Nancy, France
- 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-9355-5
- Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis:
GPU-assisted malware. 1-6 - Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Exploiting an I/OMMU vulnerability. 7-14 - Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers:
Header information in malware families and impact on automated classifiers. 15-22 - Ronghua Tian, Md. Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg:
Differentiating malware from cleanware using behavioural analysis. 23-30 - Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu:
Evaluating detection and treatment effectiveness of commercial anti-malware programs. 31-38 - Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh:
Memory behavior-based automatic malware unpacking in stealth debugging environment. 39-46 - Isabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka:
Unconditional self-modifying code elimination with dynamic compiler optimizations. 47-54 - Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak:
An Android Application Sandbox system for suspicious software detection. 55-62 - Kurt Thomas, David M. Nicol:
The Koobface botnet and the rise of social malware. 63-70 - Collin Mulliner, Jean-Pierre Seifert:
Rise of the iBots: Owning a telco network. 71-80 - Fernando C. Colón Osorio, Frank S. Posluszny:
Overcoming the limitations in computer worm models. 81-90 - Marco Ramilli, Matt Bishop:
Multi-stage delivery of malware. 91-97 - Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee:
Generic unpacking using entropy analysis. 98-105 - Rodrigo Rubira Branco, Udi Shamir:
Architecture for automation of malware analysis. 106-112 - Shanhu Shang, Ning Zheng, Jian Xu, Ming Xu, Haiping Zhang:
Detecting malware variants via function-call graph similarity. 113-120
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.