Shadow attacks: automatically evading system-call-behavior based malware detection Weiqin MaPu DuanJyh-Charn Liu Original Paper 20 December 2011 Pages: 1 - 13
Opcode graph similarity and metamorphic detection Neha RunwalRichard M. LowMark Stamp Original Paper 03 April 2012 Pages: 37 - 52
Reducing the window of opportunity for Android malware Gotta catch ’em all Axelle ApvrilleTim Strazzere Original Paper 26 April 2012 Pages: 61 - 71