In situ reuse of logically extracted functional components Craig MilesArun LakhotiaAndrew Walenstein Original Paper 14 June 2012 Pages: 73 - 84
On covert channels between virtual machines P. RanjithChandran PriyaKaleeswaran Shalini Original Paper 15 June 2012 Pages: 85 - 97
ECFGM: enriched control flow graph miner for unknown vicious infected code detection Mojtaba EskandariSattar Hashemi Original Paper 19 June 2012 Pages: 99 - 108
Dronezilla: designing an accurate malware behavior retrieval system Mihai CimpoesuClaudiu Popa Original Paper 04 July 2012 Pages: 109 - 116