www.malwareconference.org

Malware Conference News

Malware 2017 Best Paper Award

Malware 2017
Best Paper Award - Research Track

Presented to

Lorenzo De Carli

Colorado State University, USA 

Read More

Login Form

 

7

01:000 - 03:00 PM: 

 

Special Session: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?

 

Session Chair  Fernando Colon Osorio


 

Topic: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?

Over the last ten years, the security threat surface has greatly expanded to the point that single security solutions such as: (i) end-point protection solutions, (ii) boundary security gateways, (iii) Next Generation Firewalls (NFG's), and threat intelligence feeds are no longer effective. Their ineffectiveness has been largely demonstrated by the exponential increase in the volume and impact of security breaches.

In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's Circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) threats are often distributed in nature both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the ability to provide early warnings and execute countermeasures that minimize damage from cyber-attackers. The problem is not about single or even multiple independent security devices each providing some amount of absolute protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into wide-angle actionable information in order to minimize the impact of the most likely threats in your specific enterprise environment. This approach has been called “Fabric of Security.”, "Cognitive Security", "Large Scale Security Analytics". It is a layered model that easily accommodates distributed deployment of security in multi-vendor environments.

In this session, four security experts and leaders in their corresponding disciplines will present their u understanding of the problem, describe the solutions that their organizations, both corporate and academic, have put forth, and engage in a lively panel covering the future of Watson and security., Emerging Malware.

 

03:00 - 03:15 PM

Afternoon Break

03:15 - 05:15 PM: 

Session # 7:  Theoretical Approaches for Malware Detection

 

Session Chair  Jose A. Morales

1570372905 - "What Can N-Grams Learn for Malware Detection?" by Richard Zak, Edward Raff and Charles Nicholas, Laboratory of Physical Sciences & University of Maryland, USA


1570382041 - "Efficient Fuzzy Extractor Implementations for PUF Based Authentication" by Yuejiang Wen and Yingjie Lao, Clemson University

 

1570378896 - "Predicting Signatures of Future Malware Variants" by Avi Pfeffer, Michael Howard, Mukesh Dalal and Michael Reposa, Charles River Analytics, USA.

05:15 - 05:30 PM   Closing, Final Remarks, Malware 2018 Planning

Dr. Fernando C. Colon Osorio, General Program Chair
05:30 PM:   Adjourn
   

Previous
  Next