www.malwareconference.org

Malware Conference News

Thank You Letter to Dr. Anthony Arrott and Prof. Arun Lakhotia

Malware 2016
Outstanding Contribution Award

and

Thank you

Presented to

Dr. Anthony Arrott and Prof. Arun Lakhotia

In recognition to their contributions to
the Field of Information and Systems Security
and their devotion in making the Malware Conference truly world class.

Malware Conference 2016 Best Paper Award

 Malware Conference 2016 Best Paper Award

Presented to

Dr. WILLIAM CASEY and Mr. AARON SHELMIRE ANOMALI

of the

SOFTWARE ENGINEERING INSTITUTE, CARNEGIE-MELLON UNIVERSIOTY

Pittsburg, Pennsylvania,  USA

Login Form

The 11th International Conference on Malicious and Unwanted Software (MALCON 2016) will be held at the Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 18-21st, 2016 (October 20th, 2016 - optional). The Focus of the conference this year is twofold - (1) Security architectures & reformulated solutions, and (2) The demise of traditional end-point protection. The topics are described in the paragraphs below.  click here For the CFP.

Security Architectures & Reformulated Solutions

In the past, the security protection model that most organizations applied to protect their infrastructure was simply the "Everything but the Kitchen Sink" model—meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base., and on, and on.... In essence, this model simply amounted to the accumulation of security devices. Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed.

In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that  (i) threats are often distributed both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you

detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the  ability to provide early warnings and execute countermeasures that minimize both products vulnerability and damage from cyber-attackers. 

Security products are no longer about single or even multiple independent security devices each providing close-as-we-can-get-to-perfect standalone protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into 

wide-angle actionable information applicable to your specific enterprise environment.  We call this approach the “Fabric of Security” , see [Colon Osorio].This approach has led to the specification of several new (and revived) security architectures.  Some are “open” (e.g., Blue Coat Open Architecture) while others are more proprietary, such as the Security Control Framework (SCF) and SAFE architectures from Cisco

The conference organizers encourage participants to submit manuscripts evaluating alternate security architectures including analyses of their practical effectiveness when actually deployed.

The Demise of Traditional End-point Protection

The second topic that the conference will address this year,  is that of the declined importance of traditional end-point security that treat end-points as isolated and securable trusted zones. As the computer industry has evolved to a "Cloud-based Computing Model", where applications 

and data are accessible from anywhere in the world using mobile devices such as Smartphones and tablets, protecting end-point devices as well as protecting the integrity of cloud-based applications and data, and even user accounts, has become paramount. Within this context, conference organizers seek manuscripts describing and contrasting this paradigm shift; manuscripts that address security in the Cloud-based Computing Model; and manuscripts that compare and contrast the effectiveness of end-point centric protection versus cloud-based security solutions.

In addition to the above themes submissions are solicited in, but not limited to, the following areas as well:

• Combating Broad Spectrum Malware amidst changing reality of network walls and end-point trusted zones.

• Evolving nature of Cyberattacks, including advanced targeted attacks, Ransomware, crypto lockers, phishing, etc. 

• Malware and its impact in social networking and cloud computing.

• Enterprise security in the presence of BYOD devices and Smartphone malware.

• Analysis and measurements of real malware incidents, and security architectures.

• Botnet attacks, detection/tracking and defense.

• Malware economics and black market studies.

• Code reverse engineering tools and practices.

• Malware performance, analysis and capture tools

• Legal aspects of cyber security, including risk and compliance issues impacting executive decisions.

Publication

The proceedings of the conference will be published in printed and DVD form and will be included in the IEEE Xplore digital library.  In addition, the Conference’s Technical Program Committee will select one manuscript as a recipient of the “Best Paper Award”.  The Best Paper Award author, together with the authors of a few selected manuscripts from the conference, will be invited to submit an extended version to a special issue of the Journal of Computer Security.

Paper Submission Information

Papers should be submitted through EDAS system at:

https://www.edas.info

Submitted manuscripts must be 10-point font size, and should not exceed 8 single-spaced pages in length, including the abstract, figures, and references. Authors whose manuscript exceeds the 8 page limit may be allowed to include two additional pages for an extra charge. However, under no circumstances shall a submitted manuscript exceed the 10 page limit. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. 

Additional Information

For more information on Malware 2016  or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair, Malware 2016 at This email address is being protected from spambots. You need JavaScript enabled to view it. or visit our web site www.malwareconference.org.  For information concerning submission of an original manuscript to the conference, please contact the Technical Program Committee Chairs (TPC), Dr. Anthony Arrott, CheckVir, USA – This email address is being protected from spambots. You need JavaScript enabled to view it., and Prof. Arun Lakhotia, University of Louisiana at Lafayette - This email address is being protected from spambots. You need JavaScript enabled to view it..

Malware 2016 Program Committee

General Program Chair:

·   Dr. Fernando C. Colon Osorio, WSSRL and Brandeis University, USA

Technical Program Committee Co-Chairs:

·   Dr. Anthony Arrott, CheckVir, USA

·   Prof. Arun Lakhotia,  University of Louisiana at Lafayette

Technical Program Committee Members :

 

·   Mr. Dennis, Batchelder, Microsoft Corporation, USA

·   Mr. Frédéric Besson, Inria, France 

·   Dr. Guillaume Bonfante, LORIA, France

·   Prof. Richard Brooks, Clemson University, USA

·   Dr. Andreas Clementi, AV Comparatives, Germany

·   Dr. Seyit A. Camtepe, Technische Universität Berlin, Germany

·   Dr. Olivier Festor, INRIA Nancy Grand-Est, France

·   Mr. Ivan Macalintal, Microsoft, USA

·   Dr. Ferenc Leitold, Veszprog, Hungary

·   Prof. Jean-Yves Marion, École des mines de Nancy, France,  

·   Prof. Todd McDonald, University of South Alabama, USA

·   Dr. Jose Andres Morales, CERT - Carnegie Mellon University, USA

·   Dr. Jose Ortiz, Universidad de Puerto Rico, Rio Piedras Campus, Puerto Rico

·   Prof. Golden G Richard, University of New Orleans, USA

·   Dr. Aubrey-Derrick Schmidt, T-Systems International GmbH, Germany 

·   Dr. Axel Simon, Technical University, Munich, Germany

·   Prof. Natalia Stakhanova, University of New Brunswick, CA

·   Prf. Mark Stamp - San Jose State University, USA

·   Dr. Andrew Walenstein, Blackberry, USA

·   Mr. Jeff Williams, Dell SecureWorks, USA

·   Prof. Cliff C. Zou (Changchun Zou), University Central Florida, USA

Malware 2016 Keynote, Panels & Tutorials :

 

·   Mr. Neil Rubenking, PC Magazine

 

Local Conference Chair

 

·   Prof. Jose Ortiz, Computer Science, Universidad de Puerto Rico,  USA

 

·   Mr. Javier Abreu, PRSS Developer Services Manager at Microsoft, USA

 

Submission of papers

 

Research Track

Submissions are Now Closed

Research Track Abstract Deadline

Submissions are Now Closed

Industry Track

Submissions are Now Closed

Short Paper Track

Submissions are Now Closed

Notification of Acceptance

September 1st, 2016, 23:59:59 EST

Camera ready paper:

September 8th, 2016: 23:59:59 EST

Conference dates

October 18-21st, 2016

Click Here to Submit a Manuscript

Travel Arrangements:

 

Airlines:

 

From the East Coast of the US:

 

Boston To SJU: JetBlue has three noon-stops a day ( 6:30 AM, 10:45 AM, and 11:55 PM, with a typical fare of $ 432.00 round trip

 

NYC to SJU - JetBlue has 8 non-stop flights starting a 6:30 AM, with the last flight departing at 11:35 PM with a typical fare of $ 356.00 round trip

 

Washington, DC to SJU - One daily flight non-stop with Jet Blue  at 8 AM. Cost at about $400 round trip.

 

Philadelphia to SJU - 3 Non-Stops a day with American Airlines, Cost at around $420.00 round-trip

 

From the West Coast of the US:

 

San Francisco Area to SJU - Delta or American Airlines. Several 1-stop through NYC, Dallas or Miami. Cost around $500.00 round trip.

 

Combining Your Attendance to MALCON with Virus Bulletin, October 5-7, 2016 in Denver, Colorado.

 

1. If you attend VB only, then air fare is:

Frankfurt - Denver  3 - 8 Oct

from $1083 (1 stop - Condor thru Seattle or Icelandic thru Reykjavik)

from $1644 (non-stop - United, Lufthansa)

 

2. If you combine VB with MALCON, then,

VB + MalCon conferences with weekend in Colorado Rockies

Frankfurt - Denver  3 Oct

Denver - San Juan  10 Oct

San Juan - Frankfurt 15 Oct

from $1483 (all 1 stop or less - United/American)

 

Hotel Transportation:

 

There are two Basic ways. Namely using the hotel services at around $85.00 round trip or a private taxi - at around $100 for 3-4 passengers.