Malware Conference News
Thank You Letter to Dr. Anthony Arrott and Prof. Arun Lakhotia
Malware 2016
Outstanding Contribution Award
and
Thank you
Presented to
Dr. Anthony Arrott and Prof. Arun Lakhotia
In recognition to their contributions to
the Field of Information and Systems Security
and their devotion in making the Malware Conference truly world class.
Malware Conference 2016 Best Paper Award
Malware Conference 2016 Best Paper Award
Dr. WILLIAM CASEY and Mr. AARON SHELMIRE ANOMALI
SOFTWARE ENGINEERING INSTITUTE, CARNEGIE-MELLON UNIVERSIOTY
Pittsburg, Pennsylvania, USA
Login Form
2nd International Conference on Malicious and Unwanted Software (Malware 2016) Networking Event
The MALCON Snorkling & Network Event provides an opportunity to researchers, industry practitioners, and all members of the MALCON community to exchange ideas, create alliances, and explore cooperative opportunities that will benefit all members of the community. The event takes you to a private island where you will get a chance to admire Puerto Rico's most pristine reefs and marine life. After half a day of snorkeling you are then transported to one of the worlds best five-(5) beaches of the world located in Culebra island. The all inclusive cost of the network event is $135.00
Quick Facts:
• Tour time: 9:30am - 3:45pm
• Check in time: 9:00am
• Departing marina: Puerto Del Rey, Fajardo Puerto Rico
• Ages: All family members welcome (children 3 yrs+)
Includes:
• Lunch buffet with options for all
• Beverages, including rum drinks
• Quality snorkeling equipment for all ages
• Floating devices
• Swim platforms where our guest have easy access to the water
• Snorkeling instruction for our beginners
Register by filling out the form below, and complete payment.
Email questions to This email address is being protected from spambots. You need JavaScript enabled to view it.
PROGRAM
El Conquistador Hotel & Resort 1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA |
|||
7:15 am to 8:45 am |
Breakfast and Registration |
||
8:45 am to 9:00 am |
Welcome, Conference Goals, and Introductions Dr. Fernando C. Colon Osorio WSSRL & Brandeis University |
||
9:00 am to 10:15 am |
Keynote - Prof. Vern Paxson, Professor of Electrical Engineering and Computer Sciences at the University of California, Berkeley
|
||
10:15 to 10:30 am |
Break |
||
10:30 am to 12:00 pm
Session Chair: Prof. Arun Lakhotia |
Session 1 - Broad Spectrum Malware, Defense Strategies & Mechanisms 1570175373: "Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks", Lanier Watkins and Kurt Silberberg, John Hopkins University, Jose Morales, Carnegie Mellon University & CERT, and William H. Robinson, Vanderbilt University 1570212787: "Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features", Joshua Saxe and Konstantin Berlin, Invincea Labs, LLC 1570177653: "Run-time Classification of Malicious Processes Using System Call Analysis", Raymond Canzanese, Jr., Spiros Mancoridis, Drexel University and Moshe Kam, New Jersey Institute of Technology |
12:00 pm to 1:30 pm |
Lunch & Affinity Group Discussions Broad Spectrum Malware Group Targeted Attacks Group Measurement Group Mobile Malware Group |
01:30 pm to 03:30 pm Panel Moderator: Neil Rubenking |
Panel Moderator - Neil Rubenking, PC Magazine Topic: "Continuous Threat Analysis of you environment - from Home Network to the Enterprise Trust Zones" - Part I: The Paradigm Shift
Panelists: Anthony Arrott, CheckVR, USA Arun Lakhotia, University of Louisiana, Lafayette John O'Brien, Microsoft Alexander Volynkin, Senior Research Scientist CMU Ivan Macalintal, Microsoft Description: With the emergence of Windows 10 and Windows 365, the idea that you can protect an end-point device has finally come to an end. Even in the home environment, there is no longer a single device that can be protected and its protection used as a measure of the "health/security of your system". In the home environment, the emerging paradigm is that of a Trusted Zone that includes: a. multiple Windows computers;
b. a router with an embedded firewall;
c. a cloud based repository, e.g., google drive, or Microsoft one drive;
d. multiple "the Internet of things" devices - your thermostat, your electric meter, and so forth
e. others - name them
This two day panel will discuss emerging metrics that attempt to capture what the health/security of your trusted zone looks like on a continuous basis. A key element of any such metric is the analysis of the threat landscape for your Trusted Zone. This means that the specific environment - i.e., the "Trusted Zone" characteristics are a critical element of such definition.
The panelist will attempt to take a first step in defining the metrics that can effectively characterize the health of the system under observation.
|
03:30 pm to 03:45 pm |
Break |
03:45 pm to 05:00 pm
Session Chair: Dr. Jose A. Morales |
Session 2 - Broad Spectrum Malware, Defense Strategies & Mechanisms 1570179643: "Variant: A Malware Similarity Testing Framework", Jason Upchurch, United States Air Force Academy & University of Colorado at Colorado Springs and Xiaobo Zhou, University of Colorado at Colorado Springs
1570179727: "A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation", Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa and Alexander Pretschner, Technische Universität München
1570189045: "Automatically Combining Static Malware Detection Techniques", David De Lille, Bart Coppens, Bjorn De Sutter, Electronics and Information Systems, Ghent University, Belgium and Daan Raman, NVISO bvba, Belgium |
El Conquistador Hotel & Resort 1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA |
|
07:00 am to 8:00 am |
Breakfast and Registration |
08:00 am to 10:15 am
Session Chair: Prof. Arun Lakhotia |
Session 3 - Mechanisms & Strategies to Thwart Attacks
1570179615: "Segmented Sandboxing - A Novel Approach to detecting Malware Polymorphisms", Fernando C. Colon Osorio, Hongyuan Qiu, Brandeis University & WSSRL Lab, USA and Anthony Arrott, CheckVr, Hungary & USA
1570212789:" Sandboxing and Reasoning on Malware Infection Trees", Krishnendu Ghosh, Miami University, Jose A. Morales, Carnegie Mellon University & CERT and William Casey, Software Engineering Institute, Carnegie Mellon University, USA
1570179765: "Covert Remote Syscall Communication at Kernel Level", Florian Kerber, Dominik Teubert and Ulrike Meyer, RWTH Aachen University Germany
1570188307: "Gorille sniffs code similarities, the case study of Qwerty versus Regin", Guillaume Bonfante, Jean-Yves Marion and Fabrice Sabatier, LORIA, France |
10:15 pm to 10:30 am |
Break |
10:30 pm to 12:30 pm
Session Chair: Fernando C. Colon Osorio |
Session 4 - The Measurement Problem - Inherent Limitations of Current Measurement Frameworks
1570179969: "Measuring the information security risk in an infrastructure", Ferenc Leitold, Veszprog Ltd., Secudit Ltd. & National University of Public Service, Collage of Dunaú. jvárosKálmán Hadarics, Eszter Oroszi, Krisztina Győrffy
1570180069: "Measuring the health of antivirus ecosystems". Fanny Lalonde Lévesque and José M. Fernandez, École Polytechnique de Montréal, Canada, Anil Somayaji, Carleton University, Canada. Dennis Batchelder, Microsoft Corporation, USA
1570211675: "Stealthy Malware Traffic - Not as Innocent as It Looks". Xingsi Zhong, Yu Fu, Lu Yu and Richard Ree Brooks and G. Kumar Venayagamoorthy, Clemson University, USA |
12:30 pm to 1:30 pm |
Lunch & Affinity Group Discussions Broad Spectrum Malware Group Targeted Attacks Group Measurement Group Mobile Malware Group |
01:30 pm to 03:00 pm
Panel Moderator: Jose A. Morales |
Panel: Topic: The growing role of digital forensics in criminal investigations Panelist: Software Engineering Institute: CERT: Forensics Operations and Investigations, Carnegie Mellon University: Alexander Volynkin, Senior Research Scientist Michael P. McCord, Software Vulnerability Analyst, Peter Troxell, Member of the Technical Staff
|
03:30 pm to 03:45 pm |
Break |
03:30 am to 05:15 pm
Session Chair: Dr. Fernando C. Colon Osorio |
Session 5 -Mechanisms & Strategies to Detect Mobile Malware
Session 5 -Mechanisms & Strategies to Detect Mobile Malware 1570178721: "GroddDroid: a Gorilla for Triggering Malicious Behaviors", Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat and V. Viet Triem Tong, CentraleSupelec, Inria, Université de Rennes, France, Jean-Francois LaLande, INSA Centre Val de Loire, France 1570178829: "Clustering Android malware families by http traffic Counterfeit mobile devices", Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca and Giorgio Giacinto, Department of Electrical and Electronic Engineering, University of Cagliari, Italy 1570180209: "Targeted DoS on Android: How to disable Android in 10 seconds or less", Ryan Johnson and Angelos Stavrou, Kryptowire, Mohamed Elsabagh, George Mason University, USA , Vincent Sritapan, Department of Homeland Security, S&T, Washington, D.C., USA 1570212633 - "Counterfeit mobile devices", John O’Brien, Microsoft, Ireland and Kimmo Lehtonen, Microsoft
|
05:15 pm to 05:30
|
Closing Remarks - Dr. Fernando C. Colon Osorio, General Program Chair |
El Conquistador Hotel & Resort 1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA |
|||||||
07:00 am to 8:00 am |
Breakfast and Registration |
||||||
08:00 am to 12:15 am
|
Concurrent Sessions
Session A: Workshop
Session B: Penetration Testing Tutorial - Assessing Your Overall Security Before the Attackers do.
What is Pen-Testing? Why Perform Pen-Testing? Pen-Testing Tools And Reporting Analysis Of CORE IMPACT Metasploit Framework 3.0 |
||||||
12:15 pm to 01:15 pm |
Lunch |
||||||
01:15 pm to 05:00 pm
Session Chair: Dr. Jose A. Morales |
2nd Annual Capture The Flag Contest as part of the 10th IEEE Technically Sponsored International Conference on Malicious and Unwanted Software (MALCON 2015)
Winners will be announced and prizes awarded at the end of the MALCON 2015 Conference. All participants in the conference are welcomed to form a team. For Further Information contact: Dr. Jose A. Morales, CFT Organizer and/or Mr. Dan Klinedinst, CTF Organizer
|
09:00 am to 03:45 pm
|
Culebra Getaway Networking Event - Beach and Snorkel Tour & Day Trip Details:
• Check in time: 9:00am • Departing: Lobby, El Conquistador Hotel & Resort, Fajardo Puerto Rico
Includes: • Lunch buffet with options for all • Beverages, including rum drinks • Quality snorkeling equipment for all ages • Floating devices • Swim platforms where our guest have easy access to the water • Snorkeling instruction for our beginners Cost: $ 125.00 pp Upon departing marina Puerto Del Rey, we head straight out to Culebra along the Cordillera Islands. After about 45 minutes on our high-speed catamaran we arrive at one of Culebra’s beautiful reefs and anchor for about an hour and a half of snorkeling. Depending on water condition our captains may take you to: Luis Pena, Carlos Rosario, or Melones We then move on to our beach stop, Culebrita, Playa Tortuga or another beautiful beach that will be the best to enjoy the rest of the afternoon. At either location you can swim into the beach or do some more snorkeling. We depart Culebra around 3:00 pm, returning to the marina between 3:45- 4:00pm. Lunch is served at approximately 11:45-12:00pm, where our guests can enjoy local pastries; build your own sandwiches with fresh baked bread, fresh fruit, our signature pasta salad, chicken salad, coleslaw and cookies. Important: Be advised that this Snorkeling beach Trip travels by high speed boat in open waters and may not be appropriate for pregnant women, those with recent surgeries, back injuries and children under 3 yrs of age. If you tend to get seasick, we remind you that you should take an over-the-counter remedy with food at least 1 hour before the voyage.
|
Travel Arrangements
The 11th IEEE International Conference on Malicious and Unwanted Software "The Americas" (MALCON 2016) will be held at El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA, October 18-21, 2016. In this section we address the typical questions that you may have in making the necessary travel arrangements.