The Community for Technology Leaders
2014 9th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE) (2014)
Fajardo, PR, USA
Oct. 28, 2014 to Oct. 30, 2014
ISBN: 978-1-4799-7328-6
TABLE OF CONTENTS

[Front matter] (PDF)

pp. 1-23

HoneyAgent: Detecting malicious Java applets by using dynamic analysis (Abstract)

Jan Gassen , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
Jonathan P. Chapman , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
pp. 109-117

Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files (Abstract)

Viviane Zwanger , Institute of Computer Science 4, University of Bonn, Fraunhofer FKIE
Elmar Gerhards-Padilla , Institute of Computer Science 4, University of Bonn, Fraunhofer FKIE
Michael Meier , Institute of Computer Science 4, University of Bonn, Fraunhofer FKIE
pp. 118-127

Agent-based trace learning in a recommendation-verification system for cybersecurity (Abstract)

William Casey , Software Engineering Institute, Carnegie Mellon University
Evan Wright , Software Engineering Institute, Carnegie Mellon University
Jose Andre Morales , Software Engineering Institute, Carnegie Mellon University
Michael Appel , Software Engineering Institute, Carnegie Mellon University
Jeff Gennari , Software Engineering Institute, Carnegie Mellon University
Bud Mishra , Courant Institute, New York University
pp. 135-143

Bacterial quorum sensing for coordination of targeted malware (Abstract)

Mark E. Fioravanti , Florida Institute of Technology, Dept. of Computer Science and Cybersecurity, Meblourne, FL 32901
Richard Ford , Florida Institute of Technology, Dept. of Computer Science and Cybersecurity, Meblourne, FL 32901
pp. 101-108

BoTGen: A new approach for in-lab generation of botnet datasets (Abstract)

Muhammad H. ElSheikh , National Institute for Standards-NIS Egypt
Mohammed S. Gadelrab , National Institute for Standards-NIS Egypt
Mahmoud A. Ghoneim , National Institute for Standards-NIS Egypt
Mohsen Rashwan , Cairo University
pp. 76-84

Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud (Abstract)

Ferenc Leitold , Veszprog Ltd. and College of Dunaújváros, Hungary
Anthony Arrott , Security Analytics, Veszprog Labs, USA
Fernando C. Colon Osorio , Wireless Systems Security Research Laboratory, USA
pp. 40-49

Automatic construction of printable return-oriented programming payload (Abstract)

Wenbiao Ding , State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University
Xiao Xing , State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University
Ping Chen , State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University
Zhi Xin , State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University
Bing Mao , State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University
pp. 18-25

Identifying malware genera using the Jensen-Shannon distance between system call traces (Abstract)

Jeremy D. Seideman , The Graduate School and University Center, City University of New York, New York, USA
Bilal Khan , Dept. of Math & Comp. Science, John Jay College, CUNY, New York, USA
Antonio Cesar Vargas , NacoLabs Consulting, LLC, New York, USA
pp. 1-7

Host-based code injection attacks: A popular technique used by malware (Abstract)

Thomas Barabosch , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
Elmar Gerhards-Padilla , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
pp. 8-17

Fighting banking botnets by exploiting inherent command and control vulnerabilities (Abstract)

Lanier Watkins , Information Security Institute, Johns Hopkins University, Baltimore, MD USA
Christina Kawka , Information Security Institute, Johns Hopkins University, Baltimore, MD USA
Cherita Corbett , Johns Hopkins University, Applied Physics Laboratory, Laurel MD, USA
William H. Robinson , Security and Fault Tolerance (SAF-T) Research Group, Vanderbilt University, Nashville TN, USA
pp. 93-100

Risk prediction of malware victimization based on user behavior (Abstract)

Fanny Lalonde Levesque , Ecole Polytechnique de Montréal, Montréal, Canada
Jose M. Fernandez , Ecole Polytechnique de Montréal, Montréal, Canada
Anil Somayaji , Carleton University, Ottawa, Canada
pp. 128-134

Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing (Abstract)

Andreas Clementi , AV-Comparatives, Austria
Peter Stelzhammer , AV-Comparatives, Austria
Fernando C. Colon Osorio , Wireless Systems Security Research Laboratory, USA
pp. 35-42

PsyBoG: Power spectral density analysis for detecting botnet groups (Abstract)

Jonghoon Kwon , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Jeongsik Kim , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Jehyun Lee , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Adrian Perrig , Institute of Information Security, ETH Zurich, Zurich, Switzerland
pp. 85-92

MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android (Abstract)

Jihwan Jeong , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Dongwon Seo , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Chanyoung Lee , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Jonghoon Kwon , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee , Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
John Milburn , FDCC, Seoul, Republic of Korea
pp. 50-57

Protection against remote code execution exploits of popular applications in Windows (Abstract)

Jeffrey Wu , PC Security Labs, China
Anthony Arrott , Security Analytics, Veszprog Labs, USA
Fernando C. Colon Osorio , Wireless Systems Security Research Laboratory, USA
pp. 26-31

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies (Abstract)

Mordechai Guri , Department of Information Systems Engineering, Ben-Gurion University
Gabi Kedma , Department of Information Systems Engineering, Ben-Gurion University
Assaf Kachlon , Department of Information Systems Engineering, Ben-Gurion University
Yuval Elovici , Department of Information Systems Engineering, Ben-Gurion University
pp. 58-67
82 ms
(Ver 3.3 (11022016))