The Community for Technology Leaders
2016 11th International Conference on Malicious and Unwanted Software (MALWARE) (2016)
Fajardo, PR, USA
Oct. 18, 2016 to Oct. 21, 2016
ISBN: 978-1-5090-4543-3
TABLE OF CONTENTS

Message from the general program chair (PDF)

Fernando C. Colon Osorio , Malware 2016 General Program Chair
pp. 1-2

Keynote speaker (PDF)

Dimitri Vitaliev , Founder and director of eQualit.ie
pp. 1

Author index (PDF)

pp. 1-3

Reverse engineering with bioinformatics algorithms over a sound android covert channel (Abstract)

Sergio Ivan Vargas Razo , Instituto Politécnico Nacional, Centro de Investigación en Computación
Eleazar Aguirre Anaya , Instituto Politécnico Nacional, Centro de Investigación en Computación
Ponciano Jorge Escamilla Ambrosio , Instituto Politécnico Nacional, Centro de Investigación en Computación
pp. 1-7

Dissecting developer policy violating apps: characterization and detection (Abstract)

Su Mon Kywe , School of Information Systems, Singapore Management University
Yingjiu Li , School of Information Systems, Singapore Management University
Jason Hong , School of Computer Science, Carnegie Mellon University
Cheng Yao , School of Information Systems, Singapore Management University
pp. 1-10

Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network (Abstract)

Asem Kitana , University of Victoria Dept. of Electrical & Computer Eng. Victoria, BC, Canada
Issa Traore , University of Victoria Dept. of Electrical & Computer Eng. Victoria, BC, Canada
Isaac Woungang , Ryerson University Dept. of Computer Science Toronto, ON, Canada
pp. 1-9

CARDINAL: similarity analysis to defeat malware compiler variations (Abstract)

Luke Jones , Academy Center for Cyberspace Research US Air Force Academy
Andrew Sellers , Academy Center for Cyberspace Research US Air Force Academy
Martin Carlisle , Information Networking Institute Carnegie Mellon University
pp. 1-8

Automatic extraction of malicious behaviors (Abstract)

Khanh-Huu-The Dam , IRIF, University Paris Diderot and CNRS
Tayssir Touili , LIPN, CNRS and University Paris 13
pp. 1-10

SigPID: significant permission identification for android malware detection (Abstract)

Lichao Sun , University of Nebraska–Lincoln Lincoln, NE
Zhiqiang Li , University of Nebraska–Lincoln Lincoln, NE
Qiben Yan , University of Nebraska–Lincoln Lincoln, NE
Witawas Srisa-an , University of Nebraska–Lincoln Lincoln, NE
Yu Pan , University of Nebraska–Lincoln Lincoln, NE
pp. 1-8

Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers (Abstract)

S. Morales-Ortega , Instituto Politécnico Nacional, Centro de Investigación en Computación, Mexico
P.J. Escamilla-Ambrosio , Instituto Politécnico Nacional, Centro de Investigación en Computación, Mexico
A. Rodriguez-Mota , Instituto Politécnico Nacional, Centro de Investigación en Computación, Mexico
L.D. Coronado-De-Alba , Instituto Politécnico Nacional, Centro de Investigación en Computación, Mexico
pp. 1-8

On the effectiveness of application characteristics in the automatic classification of malware on smartphones (Abstract)

Matthew Ping , Drexel University Department of Computer Science College of Computing and Informatics Philadelphia, PA
Bander Alsulami , Drexel University Department of Computer Science College of Computing and Informatics Philadelphia, PA
Spiros Mancoridis , Drexel University Department of Computer Science College of Computing and Informatics Philadelphia, PA
pp. 1-8

On periodic behavior of malware: experiments, opportunities and challenges (Abstract)

Ngoc Anh Huynh , School of Computer Engineering Nanyang Technological University
Wee Keong Ng , School of Computer Engineering Nanyang Technological University
Hoang Giang Do , School of Computer Engineering Nanyang Technological University
pp. 1-8

A covert data transport protocol (Abstract)

Yu Fu , The Holcombe Department of Electrical and Computer Engineering
Zhe Jiay , Department of Physics and Astronomy, Clemson University, Clemson, SC, USA
Lu Yu , The Holcombe Department of Electrical and Computer Engineering
Xingsi Zhong , The Holcombe Department of Electrical and Computer Engineering
Richard Brooks , The Holcombe Department of Electrical and Computer Engineering
pp. 1-8

Malware provenance: code reuse detection in malicious software at scale (Abstract)

Jason Upchurch , Center of Innovation, United States Air Force Academy, CO, USA
Xiaobo Zhou , Department of Computer Science, University of Colorado, Colorado Springs, USA
pp. 1-9

Zonedroid: control your droid through application zoning (Abstract)

Shahrear Iqbal , School of Computing Queen’s University, Kingston, Ontario, Canada
Mohammad Zulkernine , School of Computing Queen’s University, Kingston, Ontario, Canada
pp. 1-8

Advanced transcriptase for JavaScript malware (Abstract)

Fabio Di Troia , Department of Computer Science San Jose State University
Corrado Aaron Visaggio , Department of Engineering Universita degli Studi del Sannio
Thomas H. Austin , Department of Computer Science San Jose State University
Mark Stamp , Department of Computer Science San Jose State University
pp. 1-8

Anti-analysis trends in banking malware (Abstract)

Paul Black , PhishLabs
Joseph Opacki , PhishLabs
pp. 1-7

DySign: dynamic fingerprinting for the automatic detection of android malware (Abstract)

Elmouatez Billah Karbab , Concordia University
Mourad Debbabi , Concordia University
Saed Alrabaee , Concordia University
Djedjiga Mouheb , Concordia University
pp. 1-8

Signature limits: an entire map of clone features and their discovery in nearly linear time (Abstract)

William Casey , Software Engineering Institute, Carnegie Mellon University
Aaron Shelmire , Anomali
pp. 1-10
213 ms
(Ver 3.3 (11022016))