The Community for Technology Leaders
2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010) (2010)
Nancy, Lorraine
Oct. 19, 2010 to Oct. 20, 2010
ISBN: 978-1-4244-9353-1
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-vi

GPU-assisted malware (PDF)

Giorgos Vasiliadis , FORTH-ICS, Greece
Michalis Polychronakis , Columbia University, USA
Sotiris Ioannidis , FORTH-ICS, Greece
pp. 1-6

Exploiting an I/OMMU vulnerability (PDF)

Fernand Lone Sang , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
Eric Lacombe , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
Vincent Nicomette , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
Yves Deswarte , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
pp. 7-14

Header information in malware families and impact on automated classifiers (PDF)

Andrew Walenstein , Department of Computer Science, University of Louisiana at Lafayette, USA
Daniel J. Hefner , Department of Computer Science, University of Louisiana at Lafayette, USA
Jeffery Wichers , Department of Computer Science, University of Louisiana at Lafayette, USA
pp. 15-22

Differentiating malware from cleanware using behavioural analysis (PDF)

Ronghua Tian , School of IT, Deakin University, Melbourne, Australia
Rafiqul Islam , School of IT, Deakin University, Melbourne, Australia
Lynn Batten , School of IT, Deakin University, Melbourne, Australia
Steve Versteeg , CA Labs, Melbourne, Australia
pp. 23-30

Evaluating detection and treatment effectiveness of commercial anti-malware programs (PDF)

Jose Andre Morales , Institute for Cyber Security, University of Texas at San Antonio, USA
Ravi Sandhu , Institute for Cyber Security, University of Texas at San Antonio, USA
Shouhuai Xu , Institute for Cyber Security, University of Texas at San Antonio, USA
pp. 31-38

Memory behavior-based automatic malware unpacking in stealth debugging environment (PDF)

Yuhei Kawakoya , NTT Information Sharing and Platform Laboratories, 9-11, Midori-Cho 3-Chome, Musashino-Shi, Tokyo 180-8585, Japan
Makoto Iwamura , NTT Information Sharing and Platform Laboratories, 9-11, Midori-Cho 3-Chome, Musashino-Shi, Tokyo 180-8585, Japan
Mitsutaka Itoh , NTT Information Sharing and Platform Laboratories, 9-11, Midori-Cho 3-Chome, Musashino-Shi, Tokyo 180-8585, Japan
pp. 39-46

Unconditional self-modifying code elimination with dynamic compiler optimizations (PDF)

Isabelle Gnaedig , INRIA - LORIA, France
Matthieu Kaczmarek , INRIA - LORIA, France
Daniel Reynaud , Nancy Université - LORIA, France
Stephane Wloka , Nancy Université - LORIA - ENSIMAG, France
pp. 47-54

An Android Application Sandbox system for suspicious software detection (PDF)

Thomas Blasing , Technische Universität Berlin - DAI-Labor, Germany
Leonid Batyuk , Technische Universität Berlin - DAI-Labor, Germany
Aubrey-Derrick Schmidt , Technische Universität Berlin - DAI-Labor, Germany
Seyit Ahmet Camtepe , Technische Universität Berlin - DAI-Labor, Germany
Sahin Albayrak , Technische Universität Berlin - DAI-Labor, Germany
pp. 55-62

The Koobface botnet and the rise of social malware (PDF)

Kurt Thomas , University of Illinois, Urbana-Champaign, USA
David M. Nicol , University of Illinois, Urbana-Champaign, USA
pp. 63-70

Rise of the iBots: Owning a telco network (PDF)

Collin Mulliner , Security in Telecommunications, Technische Universität Berlin and Deutsche Telekom Laboratories, D-10587, Germany
Jean-Pierre Seifert , Security in Telecommunications, Technische Universität Berlin and Deutsche Telekom Laboratories, D-10587, Germany
pp. 71-80

Overcoming the limitations in computer worm models (PDF)

Fernando C Colon Osorio , Wireless Systems Security Research Laboratory, 420 Lakeside Avenue, Marlborom Massachusettsm USA
Frank S Posluszny , MITRE Corporation, 7515 Colshire Drive, McLean, VA 22102-7539 USA
pp. 81-90

Multi-stage delivery of malware (PDF)

Marco Ramilli , Dipartimento di Elettronica Informatica e Sistemistica, University of Bologna, Via Venezia, 52 - 47023 Cesena â ITALY
Matt Bishop , Department of Computer Science, University of California, Davis, 95616-8562, USA
pp. 91-97

Generic unpacking using entropy analysis (PDF)

Guhyeon Jeong , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Euijin Choo , Department of Computer Science, North Carolina State University, USA
Joosuk Lee , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Munkhbayar Bat-Erdene , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee , Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
pp. 98-105

Architecture for automation of malware analysis (PDF)

Rodrigo Rubira Branco , Check Point / Instituto Tecnológico da Aeronáutica (ITA), Brazil
Udi Shamir , Check Point / Instituto Tecnológico da Aeronáutica (ITA), Brazil
pp. 106-112

Detecting malware variants via function-call graph similarity (PDF)

Shanhu Shang , Institute of Computer Science, Hangzhou Dianzi University, China
Ning Zheng , Institute of Computer Science, Hangzhou Dianzi University, China
Jian Xu , Institute of Computer Science, Hangzhou Dianzi University, China
Ming Xu , Institute of Computer Science, Hangzhou Dianzi University, China
Haiping Zhang , Institute of Computer Science, Hangzhou Dianzi University, China
pp. 113-120
86 ms
(Ver 3.3 (11022016))