header image
Home arrow Preliminary Program
Malware 2013 - Preliminary Program
Written by Administrator   
Friday, 14 September 2012
Preliminary Program

 

8th IEEE International Conference on Malicious and Unwanted Software "The Americas"

Preliminary Program

Theme: "Malware in the Era of Cloud Services and Mobile Endpoints"

October 22-24, 2013 - El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA


 The 8th IEEE International Conference on Malicious and Unwanted Software "The Americas" (Malware 2013 The Americas) will be held at El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA, October 22-24, 2013. This year’s conference has adopted as its main theme "Malware in the Era of Cloud Services and Mobile Endpoints" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular.

 

Fundamentally,  Over the last 12 years three important dates have marked the beginnings of a major paradigm shift in computing and the security models applied to protect an emerging computing environment - March 1999, January 9th, 2007, and July 2007. These dates roughly  correspond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date,  Steve Jobs introduction of  the Iphone,, and the discovery of the Zeus Botnet. These innovations have been instrumental in enabling  a paradigm shift in computing, away from a corporate network centric model with Windows end-point devices to what we called the Circa 2020 Computing Model. In the circa 2020 Computing model applications and data reside in the Cloud, the concept of an extended Trust Domain (network) disappears - there are no barriers to protect when your data and applications reside with your vendors, and the end-point device is a SmartPhone owned and operated by your employee  (BYOD).

 

Three major research trends have emerged within this context.  First, at the end of the chain, the end-point device is a mobile BYOD with security and mobility properties never anticipated. If the end-point device is own and operated by the employee of a large corporation,  and the boundaries between "personal" and "Corporate" data, as well as applications disappears, then what is the protection model that can be used? Is the device to be "trusted", Un-Trusted, or simply operates in different modes of protection.

 

Second, the existence of either a physical or a logical "Trusted Domain" that resides and operates within the confines of a single corporate entity has disappeared..

 

Finally, the protection model and measures to be applied within the context of the new computing/protection paradigm is an important challenge. Do we protect the data?, the applications?, and how do we measure protection?

 

Preliminary Program

 

Day 1 - October 22, 2013

 

 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 9:15 AM

Welcome Remarks - Dr. Fernando Colon Osorio, General Program Chair

 9:15 - 10:15 AM

Keynote:" Hard Problems Face by the Security Industry  in the Era of Cloud Services and Mobile Endpoints devices"

Mr. .Dennis Batchelder, Microsoft Malware Protection Center (MMPC)

10:15 - 10:30 AM

Break

10:30 - 12:30 PM:

Session # 1:  Emerging threats and Malware classification

 

Session Chair: Dr. Colon Osorio

 

Manuscript # 1569803451 -  Noninvasive Detection of Anti-Forensic Malware, by , Mordehai Gur, Gabi Kedma, Tom Sela, and Yuval Elovici, Ben-Gurion University, Israel

 

Manuscript # 1569803739 - Heuristic Malware Detection via Basic Block Comparison, by Francis Adkins & Luke Jones, Northeastern University, Martin Carlisle, US Air Force Academy, and Jason Upchurch, Intel Corporation, USA

 

Manuscript # 1569803757 -  Dynamic Classification of Packing Algorithms for Inspecting Executables using Entropy Analysis, by Munkhbayar MB Bat-Erdene and Heejo Lee, Korea University, Korea.

 

 

12:30 - 01:30 PM

Lunch

01:30 - 03:00

Panel # 1 Targeted Advanced Persistent Threats - The New Horizon in  the Malware Wars

 

Moderator: Neil Ruben, PC Magazineking

 

Panelist:

Vikram Phatak, NSS Labs, USA

Peter Stelzhammer, AV-Comparatives, Austria,  Grayson Milbourne, Webroot,

Chris Pickard, MRG-Effitas, UK,   Jose Morales, Carnegie-Mellon, USA

03:00 - 03:15

Break

Day 1 - October 22, 2013 - Continued

03:15 - 05:15 PM

Session # 2: The Measurement Problem

 

Session Chair: Dr. Anthony Arrott

 

Manuscript # 1: TBA

 

Manuscript # 2: TBA

 

Manuscript # 3: TBA

 

 05:15 -07:30 PM

Free Time

07:30 - 08:00 PM

Cocktail Reception

08:00 - 10:30 PM

"Best Paper" Award Gala Dinner

     

 

Day 2 - October 23, 2013

 

 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 09:45  AM

Invited Paper

09:45 - 10:00 AM

Break

 10:00 - 12:00 AM

Session # 3: Mobile Malware

 

Session Chair: Dennis Batchelder, Microsoft

 

Manuscript # 1569794723: It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit, by  Joshua White & Jeanna Matthews, Clarkson University, USA

 

Manuscript # 1569803769: PANDORA Applies Non-Deterministic Obfuscation Randomly to Android, by Mykola Protsenko  and Tilo Müller, Friedrich-Alexander University Erlangen-Nuremberg, Germany

 

Manuscript # 1569803867 - First Byte: Force-Based Clustering of Filtered Block N-Grams to Detect Code Reuse in Malicious Software, by Jason Upchurch, United States Air Force Academy and  Xiaobo Zhou, University of Colorado at Colorado Springs, USA

12:00  - 01:00 PM

LUNCH

01:00 - 02:30 PM:

Session # 4: :Cloud Computing Malware  & Defenses

 

Session Chair: Dr. Anthony Arrott

Manuscript # 1569798893 - Countering Malware Evolution Using Cloud-Based Learning, by Jacob Ouellett, Twitter, USA; Avi Pfeffer, Charles River Analytics, USA; and  Arun Lakhotia, University of Louisiana at Lafayette, USA

 

Manuscript # 1569800307 -  REcompile: A Decompilation Framework for Static Analysis of Binaries, by Khaled Yakdan and Sebastian Eschweiler, University of Bonn, Germany and Elmar Gerhards-Padilla, Fraunhofer FKIE, Germany

 

:1569803771 -  Circumventing Keyloggers and Screendumps, by Karan Sapra, Benafsh Husain, Richard Brooks, and Melissa Smith, Clemson University, USA

02:45 - 03:00 PM

Break

03:00 - 04:30 PM

Session # 5: Botnets, Targeted Advances Persistent Threats

 

Session Chair: Dr. Anthony Arrott

 

Manuscript # 1569801997 - Analysis and diversion of Duqu's driver, by Fabrice Sabatier & Aurélien Thierry, INRIA, France, and Guillaume Bonfante & Jean-Yves Marion, LORIA, France

 

Manuscript # 1569803467 - Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus, by Dennis Andriesse & Christian Rossow, VU University Amsterdam, The Netherlands, Brett Stone-Gross, Dell Secure Works, USA,  Daniel Plohmann, Cyber Defense Research Group, Fraunhofer FKIE, Germany, and Herbert Bos, Vrije Universiteit, The Netherlands

 

Manuscript # 1569803789 - A Simple Client-Side Defense Against Environment-Dependent Web-Based Malware, Gen Lu, Karan Chadha, and Saumya Debray, University of Arizona, USA

04:30 - 05:00

Concluding Remarks - Dr. Fernando Colon Osorio, General Program Chair

 

 

 

Day 3 - October 24, 2013

 

Option # 1:

Workshop on the Future of Security & Security Products - Circa 2020o (By Invitation Only)

Sponsored by: Tend Micro Corporation & the Wireless Systems Security Research Laboratory (WSSRL)

 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 9:15 AM

Welcome Remarks - Dr. Fernando C.olon Osorio, General Program Chair

 9:15 - 10:15 AM

KeyNote:  TBA "

10:15 - 10:30 AM

Break

10:30 - 12:30 PM:

Session # 1:  TBA

 

 

12:30 - 01:30 PM

Lunch

01:30 - 03:00

Panel # 2  The Anti-Malware EcoSystem

 

Moderator:  Dr. Anthony Arrott

 

Panelist:

Dennis Batchelder, Microsoft Malware Protection Center, Prof. Mark Stamp, San Jose State University,  Ferenc Leithold, Vezprog Labs, Bill McGee, Trend Micro Corp., Neil Rubenking, PC Magazine.

 

:

 

Day 3 - October 24, 2013 - Option # 2

08:00 - 09:00

Registration & Breakfast

09:00 - 12:00

 

 

Tour: El Yunque

 

 

 

The Caribbean National Rain Forest, known as El Yunque, is the only tropical forest in the United States National Forest System. It features a high impact rainforest hike along La Mina trail, a high impact trail of about 45 minutes hikes each way. Experience rushing waterfalls, take in the green canopy and enjoy a dip in the waterfall natural pool. This is a safe and comfortable hike where the guests will learn about the ecology and Taíno folklore of the forest with a local guide leading the way. Will visit other sites within the rain forest, will be at tour guides’ judgment.

 

Cost: $95.00 (Lunch Included)

     

Additional Information

For more information on Malware 2013  or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair,

Malware 2013 at or visit our web site www.malwareconference.org.

 

                                               

Last Updated ( Sunday, 01 September 2013 )
Malware 2012 -  Best Paper Award - "ROP Payload Detection Using Speculative Code Execution"
Polls
Where shall the Malware Conference 2014 Be Held?