31 papers:
- DAC-2015-RajendranVK #detection
- Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
- CHI-2015-GadirajuKDD #behaviour #comprehension #crowdsourcing #online
- Understanding Malicious Behavior in Crowdsourcing Platforms: The Case of Online Surveys (UG, RK, SD, GD), pp. 1631–1640.
- ICSE-v1-2015-YangXALXE #behaviour #mobile #named #using
- AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
- ISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling
- Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
- DAC-2014-WaksmanRSS #analysis #assessment #functional #identification
- A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
- KMIS-2014-MikhaylovZFS #development
- Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
- SAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
- KDD-2013-ZhaoH #detection #learning #online
- Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
- SAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
- An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
- SAC-2013-JancewiczKMRS #execution
- Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (RJJ, AK, LDM, AR, AAS), pp. 1816–1823.
- DAC-2012-WeiLKP #benchmark #hardware #metric
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
- MLDM-2012-MaiorcaGC #detection #pattern matching #pattern recognition #recognition
- A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
- HPCA-2011-QureshiSLF #detection #online
- Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
- DATE-2010-DasMZC #detection #hardware #information management #memory management
- Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
- ICALP-v2-2010-BunnO #network
- Asynchronous Throughput-Optimal Routing in Malicious Networks (PB, RO), pp. 236–248.
- SEKE-2010-ShinPS #detection
- Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
- SAC-2010-DewaldHF #javascript #named
- ADSandbox: sandboxing JavaScript to fight malicious websites (AD, TH, FCF), pp. 1859–1864.
- SAC-2010-RieckSLHL #detection #named
- Botzilla: detecting the “phoning home” of malicious software (KR, GS, TL, TH, PL), pp. 1978–1984.
- ICALP-v1-2009-KlivansLS #learning
- Learning Halfspaces with Malicious Noise (ARK, PML, RAS), pp. 609–621.
- KDD-2009-MaSSV #detection #learning #web
- Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
- ICEIS-DISI-2008-VoS #component #framework
- A Framework for Protecting EJB Applications from Malicious Components (HV, MS), pp. 264–269.
- SAC-2008-AtallaMAGA #behaviour #peer-to-peer #quality #web
- Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
- SAC-2008-FonsecaVM #data access #detection #online #using
- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
- SAC-2008-SaffarianM #algorithm #novel #protocol
- A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
- ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
- Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
- ICSE-2006-MoriISI #detection #mobile
- A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
- KDD-2004-KolterM #bytecode #detection #learning
- Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
- HPDC-2004-GilburdSW #data mining #mining #privacy
- Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
- SAC-2002-WhittakerV #mobile
- Neutralizing windows-based malicious mobile code (JAW, ADV), pp. 242–246.
- EDTC-1997-BensoPRRU #approach #fault #graph #low level
- A new approach to build a low-level malicious fault list starting from high-level description and alternative graphs (AB, PP, MR, MSR, RU), pp. 560–565.
- STOC-1988-KearnsL #fault #learning
- Learning in the Presence of Malicious Errors (Extended Abstract) (MJK, ML), pp. 267–280.