Computer security paper
Paper list
Paper list
269
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes
Android
Smartphone
Sandboxes
Malware
Sandbox-evasion techniques
482
Forecasting Malware Capabilities From Cyber Attack Memory Images
Malware
555
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
Malware
IoT
567
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
Malware
ML
Deep learning
Binary reconstruction
604
YARIX: Scalable YARA-based Malware Intelligence
Malware
Intelligence