The Community for Technology Leaders
2015 10th International Conference on Malicious and Unwanted Software (MALWARE) (2015)
Fajardo, PR, USA
Oct. 20, 2015 to Oct. 22, 2015
ISBN: 978-1-5090-0317-4
TABLE OF CONTENTS

Keynote Speaker (PDF)

Vern Paxson , University of California, Berkeley
pp. 1

Author index (PDF)

pp. 1-5

Using inherent command and control vulnerabilities to halt DDoS attacks (Abstract)

Lanier Watkins , Information Security Institute, Johns Hopkins University Baltimore, MD USA
Kurt Silberberg , Information Security Institute, Johns Hopkins University Baltimore, MD USA
Jose Andre Morales , Software Engineering Institute Carnegie Mellon University Pittsburgh, PA, USA
William H. Robinson , Security and Fault Tolerance (SAF-T) Research Group Vanderbilt University Nashville TN, USA
pp. 3-10

Run-time classification of malicious processes using system call analysis (Abstract)

Raymond Canzanese , Dept. of Electrical and Computer Engineering Drexel University, Philadelphia, PA, USA
Spiros Mancoridis , College of Computing and Informatics Drexel University, Philadelphia, PA, USA
Moshe Kam , Newark College of Engineering New Jersey Institute of Technology Newark, NJ, USA
pp. 21-28

Variant: a malware similarity testing framework (Abstract)

Jason Upchurch , Center of Innovation, United States Air Force Academy, CO, USA; Intel Security Group, Intel Corporation, Hillsboro, OR, USA; Department of Computer Science, University of Colorado, Colorado Springs, USA
Xiaobo Zhou , Department of Computer Science, University of Colorado, Colorado Springs, USA
pp. 31-39

A framework for empirical evaluation of malware detection resilience against behavior obfuscation (Abstract)

Sebastian Banescu , Technische Universitat Munchen, Germany
Tobias Wuchner , Technische Universitat Munchen, Germany
Aleieldin Salem , Technische Universitat Munchen, Germany
Marius Guggenmos , Technische Universitat Munchen, Germany
Martın Ochoa , Technische Universitat Munchen, Germany
Alexander Pretschner , Technische Universitat Munchen, Germany
pp. 40-47

Automatically combining static malware detection techniques (Abstract)

David De Lille , Computer Systems Lab Ghent University, Belgium
Bart Coppens , Computer Systems Lab Ghent University, Belgium
Daan Raman , NVISO CVBA, Belgium
Bjorn De Sutter , Computer Systems Lab Ghent University, Belgium
pp. 48-55

Segmented sandboxing - A novel approach to Malware polymorphism detection (Abstract)

Fernando C. Colon Osorio , Wireless Systems Security Research Laboratory and Brandeis University
Hongyuan Qiu , Wireless Systems Security Research Laboratory and Brandeis University
Anthony Arrott , Director of Security Analytics CheckVir CheckVir, USA
pp. 59-68

Sandboxing and reasoning on malware infection trees (Abstract)

Krishnendu Ghosh , Dept. of Comp. & Info. Tech. Miami University Hamilton, OH., USA
Jose Andre Morales , Software Engineering Institute Carnegie Mellon University Pittsburgh, PA., USA
William Casey , Software Engineering Institute Carnegie Mellon University Pittsburgh, PA., USA
Bud Mishra , Courant Institute New York University New York, USA
pp. 69-73

Covert remote syscall communication at kernel level: A SPOOKY backdoor (Abstract)

Florian Kerber , RWTH Aachen University Research Group IT Security Mies-van-der-Rohe Str. 15, 52074 Aachen, Germany
Dominik Teubert , RWTH Aachen University Research Group IT Security Mies-van-der-Rohe Str. 15, 52074 Aachen, Germany
Ulrike Meyer , RWTH Aachen University Research Group IT Security Mies-van-der-Rohe Str. 15, 52074 Aachen, Germany
pp. 74-81

Gorille sniffs code similarities, the case study of qwerty versus regin (Abstract)

Guillaume Bonfante , Universite de Lorraine LORIA
Jean-Yves Marion , Universite de Lorraine LORIA
Fabrice Sabatier , INRIA LORIA
pp. 82-89

Measuring the information security risk in an infrastructure (Abstract)

Ferenc Leitold , Secudit Hungary
Kalman Hadarics , College of Dunaujvaros Hungary
Eszter Oroszi , Secudit Hungary
Krisztina Gyorffy , University Pannonia
pp. 93-100

Measuring the health of antivirus ecosystems (Abstract)

Fanny Lalonde Levesque , Ecole Polytechnique de Montreal Montreal, Canada
Anil Somayaji , Carleton University Ottawa, Canada
Dennis Batchelder , Microsoft Corporation Redmond, United States
Jose M. Fernandez , Ecole Polytechnique de Montreal Montreal, Canada
pp. 101-109

Stealthy malware traffic - Not as innocent as it looks (Abstract)

Xingsi Zhong , Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
Yu Fu , Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
Lu Yu , Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
Richard Brooks , Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
G. Kumar Venayagamoorthy , Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
pp. 110-116

GroddDroid: a gorilla for triggering malicious behaviors (Abstract)

A. Abraham , y ENS Cachan F-94230 Cachan, France
R. Andriatsimandefitra , EPI CIDRE, CentraleSupelec, Inria, Universite de Rennes 1, CNRS IRISA UMR 6074, F-35065 Rennes, France
A. Brunelat , EPI CIDRE, CentraleSupelec, Inria, Universite de Rennes 1, CNRS IRISA UMR 6074, F-35065 Rennes, France
J.-F. Lalande , INSA Centre Val de Loire, Univ. Orleans LIFO EA 4022, F-18020 Bourges, France
V. Viet Triem Tong , EPI CIDRE, CentraleSupelec, Inria, Universite de Rennes 1, CNRS IRISA UMR 6074, F-35065 Rennes, France
pp. 119-127

Clustering android malware families by http traffic (Abstract)

Marco Aresu , Department of Electrical and Electronic Engineering, University of Cagliari Piazza d’Armi, 09123, Cagliari, Italy
Davide Ariu , Department of Electrical and Electronic Engineering, University of Cagliari Piazza d’Armi, 09123, Cagliari, Italy
Mansour Ahmadi , Department of Electrical and Electronic Engineering, University of Cagliari Piazza d’Armi, 09123, Cagliari, Italy
Davide Maiorca , Department of Electrical and Electronic Engineering, University of Cagliari Piazza d’Armi, 09123, Cagliari, Italy
Giorgio Giacinto , Department of Electrical and Electronic Engineering, University of Cagliari Piazza d’Armi, 09123, Cagliari, Italy
pp. 128-135

Targeted DoS on android: how to disable android in 10 seconds or less (Abstract)

Ryan Johnson , Kryptowire, Fairfax, VA 22030, USA George Mason University, Fairfax, VA 22030, USA
Mohamed Elsabagh , Kryptowire, Fairfax, VA 22030, USA
Angelos Stavrou , Kryptowire, Fairfax, VA 22030, USA; George Mason University, Fairfax, VA 22030, USA
Vincent Sritapan , Department of Homeland Security, S&T, Washington, D.C., USA
pp. 136-143
286 ms
(Ver 3.3 (11022016))