The Community for Technology Leaders
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE) (2013)
Fajardo, PR, USA USA
Oct. 22, 2013 to Oct. 24, 2013
ISBN: 978-1-4799-2534-6
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-ix

Noninvasive detection of anti-forensic malware (Abstract)

Mordehai Guri , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
Gabi Kedma , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
Tom Sela , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
Buky Carmeli , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
Amit Rosner , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
Yuval Elovici , Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel
pp. 1-10

Heuristic malware detection via basic block comparison (Abstract)

Francis Adkins , Department of Computer Science, United States Air Force Academy
Luke Jones , Department of Computer Science, United States Air Force Academy
Martin Carlisle , Department of Computer Science, United States Air Force Academy
Jason Upchurch , Center of Innovation, United States Air Force Academy
pp. 11-18

Dynamic classification of packing algorithms for inspecting executables using entropy analysis (Abstract)

Munkhbayar Bat-Erdene , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Taebeom Kim , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Hongzhe Li , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
pp. 19-26

Measuring the effectiveness of modern security products to detect and contain emerging threats — A consensus-based approach (Abstract)

Fernando C. Colon Osorio , Wireless Systems Security Research Laboratory and Brandeis University, USA
Ferenc Leitold , Veszprog Ltd., College of Dunaújváros, Hungary
Dorottya Mike , Veszprog Ltd., College of Dunaújváros, Hungary
Chris Pickard , MRG-Effitas, United Kingdom
Sveta Miladinov , MRG-Effitas, United Kingdom
Anthony Arrott , Trend Micro Corp, USA
pp. 27-34

Use-case-specific metrics for comparative testing of endpoint security products (Abstract)

Jeffrey Wu , PC Security Labs, China
Anthony Arrott , PC Security Labs, China
pp. 35-40

Synthesizing near-optimal malware specifications from suspicious behaviors (Abstract)

Somesh Jha , University of Wisconsin-Madison
Matthew Fredrikson , University of Wisconsin-Madison
Mihai Christodoresu , Qualcomm Research Silicon Valley
Reiner Sailer , IBM T.J Watson Research Center
Xifeng Yan , University of California-Santa Barbara
pp. 41-50

It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit (Abstract)

Joshua S. White , Wallace H. Coulter School of Engineering, Clarkson University, Potsdam, NY 13676
Jeanna N. Matthews , Department of Computer Science, Clarkson University, Potsdam, NY 13676
pp. 51-58

PANDORA applies non-deterministic obfuscation randomly to Android (Abstract)

Mykola Protsenko , Friedrich-Alexander University Erlangen-Nuremberg, Germany
Tilo Muller , Friedrich-Alexander University Erlangen-Nuremberg, Germany
pp. 59-67

First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software (Abstract)

Jason Upchurch , Center of Innovation, United States Air Force Academy, CO, USA
Xiaobo Zhou , Department of Computer Science, University of Colorado, Colorado Springs, USA
pp. 68-76

An antivirus API for Android malware recognition (Abstract)

Rafael Fedler , Fraunhofer AISEC, Garching near Munich, Germany
Marcel Kulicke , Fraunhofer AISEC, Garching near Munich, Germany
Julian Schutte , Fraunhofer AISEC, Garching near Munich, Germany
pp. 77-84

Countering malware evolution using cloud-based learning (Abstract)

Jacob Ouellette , Charles River Analytics
Avi Pfeffer , Charles River Analytics
Arun Lakhotia , University of Louisiana, Lafayette
pp. 85-94

REcompile: A decompilation framework for static analysis of binaries (Abstract)

Khaled Yakdan , University of Bonn, Institute of Computer Science 4, Germany
Sebastian Eschweiler , Fraunhofer FKIE, Germany
Elmar Gerhards-Padilla , Fraunhofer FKIE, Germany
pp. 95-102

Circumventing keyloggers and screendumps (Abstract)

Karan Sapra , Electrical and Computer Engineering, Clemson University, Clemson, SC USA
Benafsh Husain , Electrical and Computer Engineering, Clemson University, Clemson, SC USA
Richard Brooks , Electrical and Computer Engineering, Clemson University, Clemson, SC USA
Melissa Smith , Electrical and Computer Engineering, Clemson University, Clemson, SC USA
pp. 103-108

Analysis and diversion of Duqu's driver (Abstract)

Guillaume Bonfante , Université de Lorraine, Loria
Jean-Yves Marion , Université de Lorraine, Loria
Fabrice Sabatier , Inria, Loria
Aurelien Thierry , Inria, Loria
pp. 109-115

Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus (Abstract)

Dennis Andriesse , VU University Amsterdam, The Netherlands
Christian Rossow , VU University Amsterdam, The Netherlands
Brett Stone-Gross , Dell SecureWorks
Daniel Plohmann , Fraunhofer FKIE, Bonn, Germany
Herbert Bos , VU University Amsterdam, The Netherlands
pp. 116-123

A simple client-side defense against environment-dependent web-based malware (Abstract)

Gen Lu , Department of Computer Science, The University of Arizona, Tucson, AZ 85721, USA
Karan Chadha , Department of Computer Science, The University of Arizona, Tucson, AZ 85721, USA
Saumya Debray , Department of Computer Science, The University of Arizona, Tucson, AZ 85721, USA
pp. 124-131

Static malware detection with Segmented Sandboxing (Abstract)

Hongyuan Qiu , Wireless System Security Research Laboratory and Brandeis University
Fernando C. Colon Osorio , Wireless System Security Research Laboratory and Brandeis University
pp. 132-141
90 ms
(Ver 3.3 (11022016))