Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Venue, Hotel, and Travel
Students and Grants
Co-Located Workshops
Program
At a Glance
Technical Sessions
Poster Session
Activities
Birds-of-a-Feather Sessions
Poster Session
WiPs
Participate
Call for Papers
Important Dates
Symposium Organizers
Symposium Topics
Refereed Papers
Shadow PC
Symposium Activities
Submitting Papers
Instructions for Participants
Sponsorship
About
Symposium Organizers
Services
Questions
Help Promote!
Past Symposia
Home
Attend
Venue, Hotel, and Travel
Students and Grants
Co-Located Workshops
Program
Activities
Participate
Call for Papers
Instructions for Participants
Sponsorship
About
Symposium Organizers
Services
Questions
Help Promote!
Past Symposia
sponsors
Platinum Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
help promote
Get more
Help Promote graphics!
connect with usenix
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by USENIXSecurity
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
How Do You Solve a Problem Like M-al-ware?
Tweet
connect with us
How Do You Solve a Problem Like M-al-ware?
Presentations:
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence
Refereed Papers II
Regency BCD
connect with us