BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (25)
model (8)
system (7)
use (7)
analysi (6)

Stem malwar$ (all stems)

43 papers:

CASECASE-2015-SundarkumarRNG #api #detection #machine learning #modelling #topic
Malware detection via API calls, topic models and machine learning (GGS, VR, IN, VG), pp. 1212–1217.
SACSAC-2015-MinV #anti #design #evaluation #implementation #novel
Design, implementation and evaluation of a novel anti-virus parasitic malware (BM, VV), pp. 2127–2133.
ICSEICSE-v2-2015-HollandDKMR #android #detection #novel #security
Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
HPCAHPCA-2015-OzsoyDGAP #detection #framework #online #performance
Malware-aware processors: A framework for efficient online malware detection (MO, CD, IG, NBAG, DVP), pp. 651–661.
CIKMCIKM-2014-WangMGH #information management #towards
Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing (TW, SM, WG, XH), pp. 1239–1248.
KDDKDD-2014-TamersoyRC #detection #graph #mining #scalability
Guilt by association: large scale malware detection by mining file-relation graphs (AT, KAR, DHC), pp. 1524–1533.
LOPSTRLOPSTR-2014-SinghK #detection #java #partial evaluation
Partial Evaluation for Java Malware Detection (RS, AK), pp. 133–147.
SACSAC-2014-CaniGSST #automation #code generation #integration #towards
Towards automated malware creation: code generation and code integration (AC, MG, ES, GS, APT), pp. 157–160.
SACSAC-2014-Cooper #android #detection #research #student
Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
FSEFSE-2014-FengADA #android #detection #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
ASEASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
TACASTACAS-2013-SongT #detection #ltl #model checking
LTL Model-Checking for Malware Detection (FS, TT), pp. 416–431.
WCREWCRE-2013-DurfinaKZ #case study #decompiler
PsybOt malware: A step-by-step decompilation case study (LD, JK, PZ), pp. 449–456.
KDDKDD-2013-KongY #automation #classification #distance #learning
Discriminant malware distance learning on structural information for automated malware classification (DK, GY), pp. 1357–1365.
SACSAC-2013-KimM #algorithm #detection #hybrid #search-based #using
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
ESEC-FSEESEC-FSE-2013-SongT #automaton #detection #model checking #named
PoMMaDe: pushdown model-checking for malware detection (FS, TT), pp. 607–610.
TACASTACAS-2012-SongT #automaton #detection #model checking
Pushdown Model Checking for Malware Detection (FS, TT), pp. 110–125.
FMFM-2012-SongT #detection #model checking #performance #using
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
EDOCEDOC-2012-HarrisonBADN #detection #framework #identification
A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
CIKMCIKM-2012-ComarLSNT #detection #kernel #linear
Weighted linear kernel with tree transformed features for malware detection (PMC, LL, SS, AN, PNT), pp. 2287–2290.
SACSAC-2012-OyamaGCSK #detection
Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
FSEFSE-2012-ChandramohanTS #behaviour #clustering #modelling #scalability
Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
ICSTICST-2012-MassicotteCNM #analysis #testing
A Testing Model for Dynamic Malware Analysis Systems (FM, MC, HN, FM), pp. 826–833.
ISSTAISSTA-2012-CanaliLBKCK #detection
A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
WCREWCRE-2011-Raber #debugging #kernel #profiling
Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space (JR), pp. 431–432.
WCREWCRE-2011-ZhaoAH #automation
Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
KDDKDD-2011-YeLZZTGA #detection
Combining file content and file relations for cloud based malware detection (YY, TL, SZ, WZ, ET, UG, MA), pp. 222–230.
KDIRKDIR-2011-RavulaCL #dynamic analysis #using
Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
CAVCAV-2011-BabicRS #analysis #automaton
Malware Analysis with Tree Automata Inference (DB, DR, DS), pp. 116–131.
ICPRICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile #using
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
KDDKDD-2010-YeLCJ #automation #categorisation #clustering #using
Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
SACSAC-2010-BayerKK #analysis #performance
Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
SACSAC-2010-LeeJL #detection #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-SamiYPHH #api #detection #mining
Malware detection based on mining API calls (AS, BY, HR, NP, SH, AH), pp. 1020–1025.
ICSEICSE-2010-KumarSS #for free
Can we certify systems for freedom from malware (NVNK, HJS, RKS), pp. 175–178.
WCREWCRE-1999-CooganDKT99a #automation
Automatic Static Unpacking of Malware Binaries (KC, SKD, TK, GMT), pp. 167–176.
KDDKDD-2009-YeLJHW #detection
Intelligent file scoring system for malware detection from the gray list (YY, TL, QJ, ZH, LW), pp. 1385–1394.
SACSAC-2009-WeiSW #algorithm #clustering #email #fuzzy #novel #string
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm (CW, AS, GW), pp. 889–890.
KDDKDD-2007-YeWLY #detection #named
IMDS: intelligent malware detection system (YY, DW, TL, DY), pp. 1043–1047.
POPLPOPL-2007-PredaCJD #approach #detection #semantics
A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
SCAMSCAM-2006-WalensteinMCL #normalisation #term rewriting #using
Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
SACSAC-2006-OsorioK #analysis #behaviour
An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
ASPLOSASPLOS-2006-CrandallWOSWC #detection #virtual machine
Temporal search: detecting hidden malware timebombs with virtual machines (JRC, GW, DASdO, ZS, SFW, FTC), pp. 25–36.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.