Malware Conference News

Malware 2018 Best Paper Award

Malware 2018
Best Paper Award - Research Track

Presented to

William Fleshman, Richard Zak and Mark McLean

Laboratory for Physical Sciences, USA


Edward Raff and Charles Nicholas

Booz Allen Hamilton and

University of Maryland, Baltimore County, USA


In recognition to their contributions to the Field of Information and Systems Security

and the quality and timeliness of their work as embodied in the manuscript:


“Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Viruscalable Encryption Fingerprinting in Dynamic Malware Trace" 

Read More

Login Form



01:000 - 03:00 PM: 


Special Session: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?


Session Chair  Fernando Colon Osorio


Topic: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?

Over the last ten years, the security threat surface has greatly expanded to the point that single security solutions such as: (i) end-point protection solutions, (ii) boundary security gateways, (iii) Next Generation Firewalls (NFG's), and threat intelligence feeds are no longer effective. Their ineffectiveness has been largely demonstrated by the exponential increase in the volume and impact of security breaches.

In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's Circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) threats are often distributed in nature both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the ability to provide early warnings and execute countermeasures that minimize damage from cyber-attackers. The problem is not about single or even multiple independent security devices each providing some amount of absolute protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into wide-angle actionable information in order to minimize the impact of the most likely threats in your specific enterprise environment. This approach has been called “Fabric of Security.”, "Cognitive Security", "Large Scale Security Analytics". It is a layered model that easily accommodates distributed deployment of security in multi-vendor environments.

In this session, four security experts and leaders in their corresponding disciplines will present their u understanding of the problem, describe the solutions that their organizations, both corporate and academic, have put forth, and engage in a lively panel covering the future of Watson and security., Emerging Malware.


03:00 - 03:15 PM

Afternoon Break

03:15 - 05:15 PM: 

Session # 7:  Theoretical Approaches for Malware Detection


Session Chair  Jose A. Morales

1570372905 - "What Can N-Grams Learn for Malware Detection?" by Richard Zak, Edward Raff and Charles Nicholas, Laboratory of Physical Sciences & University of Maryland, USA

1570382041 - "Efficient Fuzzy Extractor Implementations for PUF Based Authentication" by Yuejiang Wen and Yingjie Lao, Clemson University


1570378896 - "Predicting Signatures of Future Malware Variants" by Avi Pfeffer, Michael Howard, Mukesh Dalal and Michael Reposa, Charles River Analytics, USA.

05:15 - 05:30 PM   Closing, Final Remarks, Malware 2018 Planning

Dr. Fernando C. Colon Osorio, General Program Chair
05:30 PM:   Adjourn