www.malwareconference.org

Malware Conference News

Malware 2018 Best Paper Award

Malware 2018
Best Paper Award - Research Track

Presented to

William Fleshman, Richard Zak and Mark McLean

Laboratory for Physical Sciences, USA

and

Edward Raff and Charles Nicholas

Booz Allen Hamilton and

University of Maryland, Baltimore County, USA

 

In recognition to their contributions to the Field of Information and Systems Security

and the quality and timeliness of their work as embodied in the manuscript:

 

“Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Viruscalable Encryption Fingerprinting in Dynamic Malware Trace" 

Read More

Login Form

13th International Conference on Malicious and Unwanted Software (MALCON 2018)

 

Scholarship Program

 

Description:

 

The 13th International Conference on Malicious and Unwanted Software, see https://www.malwareconference.org, is happy to announce its 2018 scholarship program. The program targets underrepresented groups, women, and people of color interested in the security field. The scholarship provides the following benefits:

 

   100% Free Registration

   Breakfast, Lunch, and attendance to the Best Paper Awardgala dinner; 

   Attendance to all sessions, keynote, and panels; and

   Accommodations October 21st through October 24th, 2018.

 

This scholarship is open to students from the local institutions of higher learning. Five scholarships are available.

 

How to Apply?

 

1. Send an application letter that includes:

a.      Full name, address, and email

b.      Student Status, i.e., Graduate or Undergraduate

c.       Expected Graduation Date

d.      If graduate student, a short description of your current work; and

e.      A brief paragraph as to the reason you want to attend the Malware Conference

 

2. Include a copy of your resume.

 

Where to Apply?

 

Send your application package electronically to the Malware Conference General Program Chair, Dr. Fernando C. Colon Osorio, at the address below:

 

This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Awards will be announced on or before Tuesday, October 16th, 2018. Click here to download instructions.

 

00 06:30- 08:00 AM: Registration & Breakfast

08:00 - 10:00 AM:

Session # 3  Botnets

Chair: Richard Brooks

1570486227 - "An Adversarial Coupon-Collector Model of Asynchronous Moving-Target Defense Against Botnet Reconnaissance" by George Kesidis and Yuquan Shan, Pennsylvania State University, USA; Dan Fleck and Angelos Stavrou, George Mason University, USA; Takis Konstantopoulos, University of Liverpool, United Kingdom.

 

1570487984 - "Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems" by; Michaud Michael, Royal Military College of Canada, Canada; Thomas Dean, Queen's University, Canada;  Sylvain P. Leblanc, Royal Military College of Canada, Canada.

 

1570487768 - "Resilience of Pruned Neural Network Against Poisoning Attack" by Bingyin Zhao and Yingjie Lao, Clemson University, USA.

 

10:00 - 10:30 AM

Morning Break

10:30 - 12:30 PM:

Session # 4:  Anti Malware Techniques

Chair: Sylvain LeBlanc

1570474551 - "PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks" by Asaf Hecht and Adi Sagi, Ben-Gurion University of the Negev, Israel; Yuval Elovici, Ben Gurion University, Israel.


1570487985 - "METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security" by Ananth A. Jillepalli, University of Idaho & Center for Secure and Dependable Systems, USA; Daniel Conte de Leon, Brian K Johnson, Yacine Chakhchoukh, Ibukun Oyewumi and Mohammad Ashrafuzzaman, University of Idaho, USA; Frederick T Sheldon, University of Idaho & University of Memphis, USA; Jim Alves-Foss and Michael Haney, University of Idaho, USA.


1570482296 - "Behavioral Malware Classification Using Convolutional Recurrent Neural Networks" by Bander Alsulami and Spiros Mancoridis, Drexel University, USA.

12:30 - 01:30 PM: Lunch

Previous
  Next

 

7

  Option # 2:  Culebra Getaway Networking Event - Beach and Snorkel Tour & Day Trip
08:30 AM Registration At Hotel Lobby

 

 

09:00 - 03:45 PM:

 

 

 

Event Includes:

  • Lunch buffet with options for all
  • Beverages, including rum drinks
  • Quality snorkeling equipment for all ages
  • Floating devices
  • Swim platforms where our guest have easy access to the water
  • Snorkeling instruction for our beginners

 

Cost: $ 130.00 pp

 

Upon departing marina Puerto Del Rey, we head straight out to Culebra along the Cordillera Islands. After about 45 minutes on our high-speed catamaran we arrive at one of Culebra’s beautiful reefs and anchor for about an hour and a half of snorkeling. Depending on water condition our captains may take you to: Luis Pena, Carlos Rosario, or Melones

 

We then move on to our beach stop, Culebrita, Playa Tortuga or another beautiful beach that will be the best to enjoy the rest of the afternoon. At either location you can swim into the beach or do some more snorkeling. We depart Culebra around 3:00 pm, returning to the marina between 3:45- 4:00pm.

 

Lunch is served at approximately 11:45-12:00pm, where our guests can enjoy local pastries; build your own sandwiches with fresh baked bread, fresh fruit, our signature pasta salad, chicken salad, coleslaw and cookies.

 

Important: Be advised that this Snorkeling beach Trip travels by high speed boat in open waters and may not be appropriate for pregnant women, those with recent surgeries, back injuries and children under 3 yrs of age.

 

If you tend to get seasick, we remind you that you should take an over-the-counter remedy with food at least 1 hour before the voyage.4

 

To register and reserve your spot, click here. Seats are limited !!!!!!
03:45 PM   Return to Hotel
03:45 PM:   Adeu
   

Previous
   

 

                                                                                                                

 

12th  International Conference on

!! YOU HAVE BEEN REDIRECTED TO THIS PAGE FOR FINAL PAYMENT !!

 

13th  International Conference on Malicious and Unwanted Software

October 22-24, 2018
The 13th International Conference on Malicious and Unwanted Software (MALCON 2018) will be held at the at Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA  on October 22-24, 2018. 

www.MalwareConference.org

 

<![if !pub]>


<![endif]>

Malware 2018 Payment Processing

<![if !pub]>


<![endif]>

NON-IEEE Member - Malware 2018 General Session & "Best Paper" Awards Dinner
<class="auto-style2">

IEEE Member - Malware 2018 General Session & "Best Paper" Awards Dinner

Malware 2018 - Additional Tickets to Gala Dinner

Malware 2018 Authors - Additional Pages (If Needed)

Malware 2018 Additional Proceedings


Malware 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, or Malware 2017 Additional Proceedings

<![if !pub]>


<![endif]>

 

Payment Guidelines:

· Registration is not complete until payment has been received. (A printable form will be provided after submitting this form.)

· A receipt will not be provided until during the conference.

Those attending Malware 2017 are eligible for special hotel rates at the  Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA. See hotel info for details. When making your reservations by phone, please use code: MAL17 or click here to make your reservation. Instructions and directions on how to get there. REMEMBER staying at the Waldorf Astoria is not only less expensive, rate includes all expenses - taxes & gratuities, but also YOU HELP SUPPORT THE CONFERENCE.

· Payment may be made by check, money order, Visa, Mastercard, or American Express.

· Checks should be payable to 'Malware 2016', and must be drawn on either a U.S. bank or U.S. branch of a foreign bank.

· Each attendee must use a separate registration form.

· If you are not a presenting author, registration may be cancelled, but no later than September 26th, 2014 and may be subject to a 20% cancellation fee. Registrants who cancel beyond this date, or fail to attend, forfeit the registration fee.

· Payment may be made by PayPal, Visa, Mastercard, or American Express.

· Each attendee must use a separate registration form.

· You will be re-directed to PayPal for final processing.

 

 

<![if !vml]><![endif]><![if !pub]> <![endif]>

 

7

01:000 - 03:00 PM: 

 

Special Session: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?

 

Session Chair  Fernando Colon Osorio


 

Topic: Data Analytics, Threat Intelligence, Cognitive Security, Fabric of Security, and Cyber Security in the Year 2025: Is WatsonTM the key to our industry's future?

Over the last ten years, the security threat surface has greatly expanded to the point that single security solutions such as: (i) end-point protection solutions, (ii) boundary security gateways, (iii) Next Generation Firewalls (NFG's), and threat intelligence feeds are no longer effective. Their ineffectiveness has been largely demonstrated by the exponential increase in the volume and impact of security breaches.

In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's Circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) threats are often distributed in nature both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the ability to provide early warnings and execute countermeasures that minimize damage from cyber-attackers. The problem is not about single or even multiple independent security devices each providing some amount of absolute protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into wide-angle actionable information in order to minimize the impact of the most likely threats in your specific enterprise environment. This approach has been called “Fabric of Security.”, "Cognitive Security", "Large Scale Security Analytics". It is a layered model that easily accommodates distributed deployment of security in multi-vendor environments.

In this session, four security experts and leaders in their corresponding disciplines will present their u understanding of the problem, describe the solutions that their organizations, both corporate and academic, have put forth, and engage in a lively panel covering the future of Watson and security., Emerging Malware.

 

03:00 - 03:15 PM

Afternoon Break

03:15 - 05:15 PM: 

Session # 7:  Theoretical Approaches for Malware Detection

 

Session Chair  Jose A. Morales

1570372905 - "What Can N-Grams Learn for Malware Detection?" by Richard Zak, Edward Raff and Charles Nicholas, Laboratory of Physical Sciences & University of Maryland, USA


1570382041 - "Efficient Fuzzy Extractor Implementations for PUF Based Authentication" by Yuejiang Wen and Yingjie Lao, Clemson University

 

1570378896 - "Predicting Signatures of Future Malware Variants" by Avi Pfeffer, Michael Howard, Mukesh Dalal and Michael Reposa, Charles River Analytics, USA.

05:15 - 05:30 PM   Closing, Final Remarks, Malware 2018 Planning

Dr. Fernando C. Colon Osorio, General Program Chair
05:30 PM:   Adjourn
   

Previous
  Next