www.malwareconference.org

Malware Conference News

Mr. Kurt Baumgartner from Kaspersky Labs to Serve as Keynote Speaker

Mr. Kurt Baumgartner to serve as Keynote on the 10th Anniversary of the Malware Conference

The organizing committee of the Malware Conference is delighted to announce that for its 12th year of the Malware Conference, Mr. Kurt Baumgartner from Kaspersky Laboratories will serve as the Keynote speaker.

 

Malware Conference 2016 Best Paper Award

 Malware Conference 2016 Best Paper Award

Presented to

Dr. WILLIAM CASEY and Mr. AARON SHELMIRE ANOMALI

of the

SOFTWARE ENGINEERING INSTITUTE, CARNEGIE-MELLON UNIVERSIOTY

Pittsburg, Pennsylvania,  USA

Login Form

 

 7:00 - 8:00 AM

Registration & Breakfast

 8:00 - 08:15 AM

Logistics, Quiz Show - Dr. Fernando Colon Osorio, General Program Chair

 8:15 - 10:15 AM

 

Session # 3:  Evolution of Our Defense Strategies - How can we win?

 

Session Chair: Arun Lakhotia

 

i1570378758 - Phantom I/O Projector: Entrapping Malware on Machines in Production by Julian Rrushi, Western Washington University, USA


151570373936 - Preliminary Study of Fission Defenses Against Low-Volume DoS Attacks on Proxied Multiserver Systems by George Kesidis, Yuquan Shan, Pennsylvania State University, Dan Fleck and Angelos Stavrou,  George Mason University, USA.

 

1570378780 - Lightweight Behavioral Malware Detection for Windows Platforms by Bander Alsulami  and Spiros Mancoridis, Drexel University,   Avinash Srinivasan and  Hunter Dong, Temple University, USA

 

10:15 - 10:30 AM

Morning Break

10:30 - 12:30 PM:

Session # 4:  Malware, Industrial Control Systems & Defenses in the age of "Internet of Things"

Session Chair: Alexander Volynk

 


TBD

12:30 - 01:30 PM

Lunch


Previous
  Next

 

                                                                                                                

 

01:30 - 03:00 PM:

CISO panel Discussion:

Panel Moderator: Dr. Kevin McKenzie, CISO, Clemson University

Topic: When adding another security device actually increases your threat surface - the challenges of managing securioty in the age of product and serv cies overload.


Dr. McKenzie is the Chief Information Security Officer (CISO) and Executive Director of the Office of Information Security and Privacy (InfoSec) at Clemson University. During his 20 years of IT experience, he has ascended through several positions of leadership and areas of technical focus. In his position he serves as the authoritative source for information technology security and privacy related matters for Clemson University. McKenzie has recently been named the Information Security Executive of the South East and Information Security Executive of North America by the T.E.N. organization, and the recipient of the Senior Information Security Professional of the America's for Leadership by ISC^2. Additionally, Kevin is a graduate of Educause's Leadership Institute.


Panelist: TBD

03:00 - 03:30 PM

Afternoon Break

03:30 - 05:30 PM:

Session # 2:  Malware in the Times of Mobile Devices

Panel Moderator: Alexander Volynkin

1570378579 - Android Malware Family Classification Based on Resource Consumption over Time by Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli,  Leonardo Querzoni, Daniele Ucc, i and Roberto Baldoni, University of Rome "La Sapienza", Italy


1570379077 - GPFinder - Tracking the Invisible in Android Malware by Mourad Leslous, Valérie Viet Triem Tong - INRIA, Jean-François Lalande - INSa, and Thomas Genet; - IRISA, France


TBD

05:30 - 07:30 PM: Break 
07:30 - 08:00 PM:   Coktails, Open Bar, hors d’oeuvres, networking - Get to know your fellow researchers and professionals in teh area of Malware & Computer Security
08:00 - 11:00 PM:   Best Paper Award Gala Dinner with local entertaintment - Grupo Guateque
   

Previous
                                       Next

 

                                                                                                               

 

                                                                                                                

 

KNOW YOUR

 

ENEMY

RESEARCH   INDUSTRY   PERFORMANCE EVALUATION   THE LAW 

OCTOBER 11-14, 2017

 

 

EL CONQUISTADOR HOTEL & RESORT, FAJARDO, PUERTO RICO, USA

 

                                    

 

WHY ATTEND? 

MALCON IS A CONFERENCE THAT BRINGS TOGETHER INDUSTRY PRATICTIONERS AND RESEARCHERS, TOGETHER WITH ACADEMICIANS AND LAW ENFORCEMENT OFFICIALS IN AN ENVIRONMENT OF

"INTIMACY AND CANDOR"

 

TO UNDERSTAND, ANTICIPATE, AND CREATE DEFENSES AGAINST... 

EMERGING THREATS AND NOVEL ATTACKS

 

                                       

 

WHAT CAN YOU EXPECT?   

Expect three full days of high-quality speakers, content, and engagement in an environment that values "Intimacy and Candor", or as a former keynote speaker, Dennis Batchelder said while speaking about MALCON... 

 
Dennis Batchelder

"In all my years attending conferences, this is the only conference that I have attended where the speaker actually modifies its slides based on the feedback and the honest interactions with the audience"

---  Dennis Batchelder, Founder, Appesteem Corporation 

   

                                     

IMPORTANT DATES   

 

 CALL FOR PAPERS (CFP)

 

Submission of papers 

 

Research Track Abstract Deadline

July 29th, 2017, 23:59:59 EST

Research Track (Full Manuscript)

July29th, 2017, 23:59:59 EST

Industry Track

July 29th, 2017, 23:59:59 EST

Notification of Acceptance

September 8th, 2017, 23:59:59 EST

Camera ready paper: 

September 15th, 2017: 23:59:59 EST 

Conference dates

October 11-14, 2017 

 

 

Click Here for a copy of the Call For Papers (CFP)

Click Here to Submit a Manuscript

 

 

 

                                     

 

 

MALCON VIDEOS

 


MALCON 2011 Attendees Comment on DuQu
   
   

 

MALCON 2013 Best Paper Award:

"It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit"

Joshua White & Jeanna Matthews, Clarkson Univresity, NY

 

 

MALCON Best Paper Award Gala Dinner Entertaintment - Grupo Folklorico Guateque

   

   

                                   

 

WANT UPDATES ON MALCON?

 

 
SIGN UP BY FOR OUR NEWSLETTER,,,
 
 
 
 
Your information will only be used to contact you about the MALCON Conference. MALCON never shares, sells, rents, or exchanges email addresses of its members or conference attendees.

 

 

 

 

4th International Conference on Malicious and Unwanted Software (Malware 2017) Capture the Flag (CTF) Competition

 
Be a part of the 4th annual offense-only CTF event!  Cash prizes of at least $2000 for the Grand Prize, $250 for 1st place, and $150 for 2nd place, will be awarded as well as a certificate.  The CTF round will take place on October 13th at El Conquistador Hotel in Fajardo, Puerto Rico.  Team registration is required to participate in the CTF.  Teams up to 5 persons will pay $100 per person to play at the hotel including breakfast, lunch, and snacks. 

The MALCON CTF is designed to reflect real life scenarios faced by security professionals when deployed in the field.  In this offense-only event, the team’s job is to penetrate several layers of a system and collect flags for points along the way.  Our CTF tech team consists of active security professionals with several years’ experience in on and off site penetration testing.  Their experience, expertise, and know how are leveraged to create a fun CTF that is technically challenging and realistic.

Quick Facts:

What: 2017 MALCON CTF

When: October 13th 2017, 8-12 white hat hacking tutotrial, 1pm-9pm CTF.

Where: El Conquistador Hotel Fajardo Puerto Rico, teams can play on site and remote.

Registration requirements:

Fee: $100 per person, includes breakfast, lunch, snacks throughout the whole event.

Email: 1 official team contact email

IP addresses: list of IP addresses teams will play from, maximum 5 addresses per team.

Register by filling out thye form below, and complete payment.



Email questions to This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.

The Grand prize is only awarded to a team after capturing all the flags.  One team can only receive one prize.  If a team receives the grand prize they will not also receive the 1st place prize.  If multiple teams capture all the flags, the grand prize will be awarded to the team that captured all the flags in the shortest amount of time.


The 3rd Annual MalCon CTF is part of the 2016 IEEE Malware Conference (www.malwareconference.or).

 

 

 

 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 9:15 AM

Welcome Remarks - Dr. Fernando Colon Osorio, General Program Chair

 9:15 - 10:15 AM

Keynote - Kurt Baumgartner, Principal Security Researcher, Kaspersky Labs

Biography: As Principal Security Researcher, Kaspersky Lab, Kurt Baumgartner is responsible for monitoring the malware landscape across the Americas and enhancing Kaspersky Lab technologies and solutions.

Prior to joining Kaspersky Lab in 2010, Kurt was VP of Behavioral Threat Research at Symantec – PC Tools Threat Fire. Originally joining ThreatFire as a startup in 2005 as their sole Researcher, he built up and led their research efforts through two successful acquisitions. Before Symantec, Baumgartner was Chief Threat Officer at Novatix and a Threat Analyst at SonicWALL. He is an active blogger and regularly presents on malware issues at international conferences and speaks to interested media.

Topic: Attribution: the art and practice of answering the ancient question surrounding a crime - who did it?

10:15 - 10:30 AM

Break

10:30 - 12:30 PM:

Session # 1:  Emerging threats and Malware classification

Session Chair: Richard R. Brooks

1570377147 - KALI: Scalable Encryption Fingerprinting in Dynamic Malware Traces, Lorenzo De Carli; Ruben Torres; Gaspar Modelo-Howard; Alok Tongaonkar; Somesh Jha, Colorado State University, Symantec and University of Wisconsin,


1570390449 - Mining Malware Secrets, Arun Lakhotia, University of Louisiana at Lafayette, USA and Paul Black, Federational University & FireEye, Australia


1570378792 - Rootkit Detection Through Phase-Space Analysis of Power Voltage Measurements, Joel Dawson; Jeffrey Todd McDonald; Jordan Shropshire; Todd R Andel; Patrick Luckett; University of South Alabama, USA, and Lee Hively, Oak Ridge National Laboratory, USA

12:30 - 01:30 PM

Lunch

    Next