The Community for Technology Leaders
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE) (2011)
Fajardo, PR, USA
Oct. 18, 2011 to Oct. 19, 2011
ISBN: 978-1-4673-0031-5
TABLE OF CONTENTS
Papers

Front matter (Abstract)

pp. i-x

Game-theoretic design of an information exchange model for detecting packed malware (Abstract)

Anshuman Singh , University of Louisiana at Lafayette
Arun Lakhotia , University of Louisiana at Lafayette
pp. 1-7

Multiprocess malware (Abstract)

Matt Bishop , Department of Computer Science, Univ. of California, Davis, Davis, CA 95616-8562, USA
Shining Sun , Computer Science, Univ. of Hong Kong, Hong Kong
Marco Ramilli , DEIS, Univ. of Bologna Via Venezia, 52 - 47023, Cesena, Italy
pp. 8-13

Exploring network-based malware classification (Abstract)

Mathieu Couture , Communications Research Centre Canada, Ottawa, ON, Canada
Ali A. Ghorbani , Faculty of CS, University of New Brunswick, Fredericton, NB, Canada
Natalia Stakhanova , School of CIS, University of South Alabama, Mobile, AL, USA
pp. 14-20

Testing protections against web threats (Abstract)

Ferenc Leitold , Veszprog Ltd., College of Dunaújváros
pp. 20-26

Distributed malware analysis scheduling (Abstract)

Gabriel Negreira Barbosa , Qualys Vulnerability & Malware Research Labs (VMRL)
Rodrigo Rubira Branco , Qualys Vulnerability & Malware Research Labs (VMRL)
pp. 34-41

Results-oriented security (Abstract)

Matt Bishop , Dept. of Computer Science, University of California at Davis, Davis, CA 95616-8562 USA
Richard Ford , Harris Institute for Assured Information, Florida Institute of Technology, 150 W. University Blvd, Melbourne, FL 32901 USA
Marco Ramilli , D.E.I.S., University of Bologna, Via Venezia, 52 - 47023 Cesena Italy
pp. 42-49

Building malware infection trees (Abstract)

Michael Main , Institute for Cyber Security, University of Texas at San Antonio
Shouhuai Xu , Institute for Cyber Security, University of Texas at San Antonio
Jose Andre Morales , Software Engineering Institute, Carnegie Mellon University
Ravi Sandhu , Institute for Cyber Security, University of Texas at San Antonio
Weiliang Luo , Institute for Cyber Security, University of Texas at San Antonio
pp. 50-57

Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications (Abstract)

Karsten Raddatz , Technische Universität Berlin - DAI-Labor
Seyit Ahmet Camtepe , Technische Universität Berlin - DAI-Labor
Leonid Batyuk , Technische Universität Berlin - DAI-Labor
Aubrey-Derrick Schmidt , Technische Universität Berlin - DAI-Labor
Sahin Albayrak , Technische Universität Berlin - DAI-Labor
Markus Herpich , Technische Universität Berlin - DAI-Labor
pp. 66-72

DroidDreamLight lurks behind legitimate Android apps (Abstract)

Kervin Alintanahin , Trend Micro, Inc.
Mark Balanza , Trend Micro, Inc.
Bernadette Caraig , Trend Micro, Inc.
Oscar Abendan , Trend Micro, Inc.
Julius Dizon , Trend Micro, Inc.
pp. 73-78

Android platform based linux kernel rootkit (Abstract)

Dong-Hoon You , INetCop Security
Bong-Nam Noh , System Security Research Center, Chonnam National University
pp. 79-87

Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks (Abstract)

Domingo Rodriguez , Dept. of Electrical and Computer Engineering, University of Puerto Rico, Mayagüez Campus, Mayagüez, Puerto Rico
Hector M. Lugo-Cordero , Dept. of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida
Ratan K. Guha , Dept. of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida
Kejie Lu , Dept. of Electrical and Computer Engineering, University of Puerto Rico, Mayagüez Campus, Mayagüez, Puerto Rico
pp. 88-94

Phishing by form: The abuse of form sites (Abstract)

Hugo Gonzalez , Universidad Politecnica de, San Luis Potosi
Jose Nazario , Arbor Networks
Kara Nance , University of Alaska, Fairbanks
pp. 95-101

Evidence of Advanced Persistent Threat: A case study of malware for political espionage (Abstract)

Anthony Lai , Valkyrie-X Security Research Group
Ddl Ddl , Valkyrie-X Security Research Group
Frankie Li , Valkyrie-X Security Research Group
pp. 102-109

A recoverable hybrid C&C botnet (Abstract)

Zhiqi Zhang , Beijing University of Posts and Telecommunications
Weiqing Lu , Institute of Computing Technology, Chinese Academy of Sciences
Chaoge Liu , Beijing University of Posts and Telecommunications
Xiang Cui , Institute of Computing Technology, Chinese Academy of Sciences
Peng Liao , Institute of Computing Technology, Chinese Academy of Sciences
pp. 110-118
242 ms
(Ver 3.1 (10032016))