The Community for Technology Leaders
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE) (2012)
Fajardo, PR, USA USA
Oct. 16, 2012 to Oct. 18, 2012
ISBN: 978-1-4673-4880-5
TABLE OF CONTENTS
Papers

A transformation-based model of malware derivation (Abstract)

Andrew Walenstein , School of Computer Science and Informatics, University of Louisiana at Lafayette, USA
Arun Lakhotia , Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA
pp. 17-25

Analysis and detection of malicious data exfiltration in web traffic (Abstract)

Areej Al-Bataineh , Department of Computer Science, University of Texas at San Antonio, USA
Gregory White , Department of Computer Science, University of Texas at San Antonio, USA
pp. 26-31

Circumventing cryptography in virtualized environments (Abstract)

Brian Hay , Security Works, USA
Kara Nance , Security Works, USA
pp. 32-38

Malware Analysis and attribution using Genetic Information (Abstract)

Avi Pfeffer , Charles River Analytics, USA
Catherine Call , Charles River Analytics, USA
John Chamberlain , Charles River Analytics, USA
Lee Kellogg , Charles River Analytics, USA
Jacob Ouellette , Charles River Analytics, USA
Terry Patten , Charles River Analytics, USA
Greg Zacharias , Charles River Analytics, USA
Arun Lakhotia , University of Louisiana, Lafayette, USA
Suresh Golconda , University of Louisiana, Lafayette, USA
John Bay , Assured Information Security, USA
Robert Hall , Assured Information Security, USA
Daniel Scofield , Assured Information Security, USA
pp. 39-45

Measuring security risk in the cloud-enabled enterprise (Abstract)

Ferenc Leitold , Veszprog Ltd., College of Dunaújváros, Hungary
Kalman Hadarics , College of Dunaújváros, Hungary
pp. 62-66

Click-fraud monetizing malware: A survey and case study (Abstract)

Tommy Blizard , Microsoft, USA
Nikola Livic , Microsoft, USA
pp. 67-72

Smartphone malware detection: From a survey towards taxonomy (Abstract)

Abdelfattah Amamra , Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
Chamseddine Talhi , Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
Jean-Marc Robert , Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
pp. 79-86

Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices (Abstract)

John Spaulding , Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Alyssa Krauss , Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Avinash Srinivasan , Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
pp. 87-93

BinGraph: Discovering mutant malware using hierarchical semantic signatures (Abstract)

Jonghoon Kwon , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
pp. 104-111

Code synchronization by morphological analysis (Abstract)

Guillaume Bonfante , Université de Lorraine, LORIA, France
Jean-Yves Marion , Université de Lorraine, LORIA, France
Fabrice Sabatier , INRIA, LORIA, France
Aurelien Thierry , Université de Lorraine, INRIA, France
pp. 112-119

“TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking (Abstract)

Zhibo Zhao , Wireless Systems Security Research Laboratory and Brandeis University, USA
Fernando C. Colon Osono , Wireless Systems Security Research Laboratory and Brandeis University, USA
pp. 135-143

A scalable search index for binary files (Abstract)

Wesley Jin , CMU, USA
Charles Hines , CERT, USA
Cory Cohen , CERT, USA
Priya Narasimhan , CMU, USA
pp. 94-103

A trusted ecosystem for Android applications based on context-aware access control (Abstract)

Markus Herpich , Technische Universität Berlin - DAI-Labor, Germany
Leonid Batyuk , Technische Universität Berlin - DAI-Labor, Germany
Seyit Ahmet Camtepe , Technische Universität Berlin - DAI-Labor, Germany
Sahin Albayrak , Technische Universität Berlin - DAI-Labor, Germany
pp. 73-78

[Front matter] (Abstract)

pp. i-xii
95 ms
(Ver )