The Community for Technology Leaders
2009 4th International Conference on Malicious and Unwanted Software (MALWARE 2009) (2009)
Montreal, QC
Oct. 13, 2009 to Oct. 14, 2009
ISBN: 978-1-4244-5786-1
TABLE OF CONTENTS

Smartphone malware evolution revisited: Android next target? (PDF)

Aubrey-Derrick Schmidt , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Hans-Gunther Schmidt , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Leonid Batyuk , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Jan Hendrik Clausen , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Seyit Ahmet Camtepe , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Sahin Albayrak , Technische Universitä Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Can Yildizli , Sabanci University, Istanbul, Turkey
pp. 1-7

Malware propagation in Online Social Networks (PDF)

Mohammad Reza Faghani , APA Professional Center, Department of Electrical and Computer Engineering, Isfahan University of Technology, Iran
Hossein Saidi , Department of Electrical and Computer Engineering, Isfahan University of Technology, Iran
pp. 8-14

Detecting Symbian OS malware through static function call analysis (PDF)

Aubrey-Derrick Schmidt , Technische Universität Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Jan Hendrik Clausen , Technische Universität Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Ahmet Camtepe , Technische Universität Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
Sahin Albayrak , Technische Universität Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany
pp. 15-22

An automated classification system based on the strings of trojan and virus families (PDF)

Ronghua Tian , School of IT, Deakin University, Melbourne, Australia
Lynn Batten , School of IT, Deakin University, Melbourne, Australia
Rafiqul Islam , School of IT, Deakin University, Melbourne, Australia
Steve Versteeg , CA Labs, Melbourne, Australia
pp. 23-30

Nebula - generating syntactical network intrusion signatures (PDF)

Tillmann Werner , University of Bonn, Roemerstrasse 164, 53117, Germany
Christoph Fuchs , University of Bonn, Roemerstrasse 164, 53117, Germany
Elmar Gerhards-Padilla , University of Bonn, Roemerstrasse 164, 53117, Germany
Peter Martini , University of Bonn, Roemerstrasse 164, 53117, Germany
pp. 31-38

Classification and detection of metamorphic malware using value set analysis (PDF)

Felix Leder , University of Bonn, Institute of Computer Science IV, Roemerstr. 164, 53117, Germany
Bastian Steinbock , University of Bonn, Institute of Computer Science IV, Roemerstr. 164, 53117, Germany
Peter Martini , University of Bonn, Institute of Computer Science IV, Roemerstr. 164, 53117, Germany
pp. 39-46

Obfuscated malicious javascript detection using classification techniques (PDF)

Peter Likarish , Dept. of Computer Science, The University of Iowa, 52242, USA
Eunjin Jung , Dept. of Computer Science, The University of Iowa, 52242, USA
Insoon Jo , Distributed Computing Systems Lab, School of Computer Science and Engineering, Seoul National University, Korea
pp. 47-54

Server-side dynamic code analysis (PDF)

Wadie Guizani , Nancy University - LORIA, Campus Scientifique - BP 239, 54506 Vandoeuvre-lès-Nancy Cedex (France)
Jean-Yves Marion , Nancy University - LORIA, Campus Scientifique - BP 239, 54506 Vandoeuvre-lès-Nancy Cedex (France)
Daniel Reynaud-Plantey , Nancy University - LORIA, Campus Scientifique - BP 239, 54506 Vandoeuvre-lès-Nancy Cedex (France)
pp. 55-62

Malware analysis with graph kernels and support vector machines (PDF)

Cynthia Wagner , University of Luxembourg, FSTC, Secan-Lab, L-1359, Luxembourg
Gerard Wagener , University of Luxembourg, FSTC, Secan-Lab, L-1359, Luxembourg
Radu State , University of Luxembourg, FSTC, Secan-Lab, L-1359, Luxembourg
Thomas Engel , University of Luxembourg, FSTC, Secan-Lab, L-1359, Luxembourg
pp. 63-68

The waledac protocol: The how and why (PDF)

Greg Sinclair , iDefense/, University of North, Carolina at Charlotte, USA
Chris Nunnery , University of North, Carolina at Charlotte, USA
Brent ByungHoon Kang , University of North, Carolina at Charlotte, USA
pp. 69-77

Optimising sybil attacks against P2P-based botnets (Abstract)

Carlton R. Davis , École Polytechnique de Montréal, QC, Canada
Jose M. Fernandez , École Polytechnique de Montréal, QC, Canada
Stephen Neville , University of Victoria, Victoria, BC, Canada
pp. 78-87

Malware authors don't learn, and that's good! (PDF)

Joan Calvet , École Polytechnique de Montréal, QC, Canada
Carlton R. Davis , École Polytechnique de Montréal, QC, Canada
Pierre-Marc Bureau , ESET, San Diego, CA, U.S.A.
pp. 88-97

Analyzing DNS activities of bot processes (PDF)

Jose Andre Morales , Institute for Cyber Security, University of Texas at San Antonio, USA
Areej Al-Bataineh , Department of Computer Science, University of Texas at San Antonio, USA
Shouhuai Xu , Department of Computer Science, University of Texas at San Antonio, USA
Ravi Sandhu , Institute for Cyber Security, University of Texas at San Antonio, USA
pp. 98-103
99 ms
(Ver 3.3 (11022016))