Accepted papers

  1. Multi-Stage Delivery of Malware, Marco Ramilli (Universita di Bologna,IT), Matt Bishop (University of California, Davis, US)
  2. Exploiting an I/OMMU vulnerability, Fernand Lone Sang (LAAS-CNRS,FR), Eric Lacombe (LAAS-CNRS,FR), Vincent Nicomette (LAAS-CNRS,FR), Yves Deswarte (LAAS-CNRS, FR)
  3. A Novel SLA-Based Approach for Malicious and Unwanted Software Detection, Yasser Yasami (Amirkabir University of Technology,IR)
  4. The Koobface Botnet and the Rise of Social Malware, Kurt Thomas (University of California, Berkeley,US), David Nicol (University of Illinois, Champaign-Urbana, US)
  5. GPU-Assisted Malware, Giorgos Vasiliadis (Institute of Computer Science, Foundation for Research and Technology ‚Hellas,GR), Michalis Polychronakis (ICS-FORTH, GR), Sotiris Ioannidis (University of Crete,GR)
  6. Differentiating Malware from Cleanware Using Behavioural Analysis, Rafiqul Islam (Deakin University, Melbourne, AU), Ronghua Tian (Deakin University, Melbourne, AU), Lynn Batten (Deakin University, Burwood, AU), Steven Versteeg (CA Labs, Melbourne, AU)
  7. Architecture for Automation of Malware Analysis, Rodrigo Branco (Instituto Tecnologico da Aeronautica, Bauru, BR), Udi Shamir (Check Point, Rehovot, IL)
  8. Evaluating Detection and Treatment Effectiveness of Commercial Anti-malware Programs, Jose Morales (University of Texas at San Antonio, San Antonio, US), Ravi Sandhu (University of Texas at San Antoni US), Shouhuai Xu (University of Texas at San Antonio, , US)
  9. Memory Behavior-Based Automatic Malware Unpacking in Stealth Debugging Environment,Yuhei Kawakoya (NTT, Tokyo, JP), Makoto Iwamura (NTT Information Sharing Platform Laboratories, , JP), Mitsutaka Itoh (NTT Corporation,JP)
  10. Rise of the iBots: 0wning a telco network, Collin Mulliner (TU-Berlin and Deutsche Telekom Laboratories, Berlin, DE), Jean-Pierre Seifert (Technical University, Berlin,DE)
  11. Overcoming the limitations in Computer Worm Models, Fernando Colon Osorio (Wireless Systems Security Research Lab, Worcester, US), Frank Posluszny (MITRE Corporation, , US)
  12. Generic Unpacking using Entropy Analysis, Guhyeon Jeong (Korea University, KR), Euijin Choo (North Carolina State University, , KR); Ju-suk Lee (Korea University, KR), Munkhbayar Bat-Erdene (Korea Universiy ,MN), Heejo Lee (Korea University, Seoul, KR)
  13. Generic unpacking with runtime compiler optimization, Isabelle Gnaedig (INRIA, FR), Matthieu Kaczmarek (Nancy University - LORIA, FR), Daniel Reynaud (Nancy University - LORIA, Nancy, FR), Stephane Wloka (Nancy University - LORIA, FR)
  14. An Android Application Sandbox System for Suspicious Software Detection, Thomas Blasing (Technische Universitat Berlin, DE), ubrey-Derrick Schmidt (Technische Universitat Berlin,DE), Leonid Batyuk (Technische Universita Berlin, DE), Seyit Camtepe (Technische Universitat Berlin, Berlin, DE), Sahin Albayrak (Technische Universitat Berlin, Berlin, DE)
  15. Header Information in Malware Families and Impact on Automated Classifiers, Andrew Walenstein (University of Louisiana at Lafayette,US)