8th IEEE International Conference on Malicious and Unwanted Software "The Americas"
Preliminary Program
Theme: "Malware in the Era of Cloud Services and Mobile Endpoints"
October 22-24, 2013 - El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA
The 8th IEEE International Conference on Malicious and Unwanted Software "The Americas" (Malware 2013 The Americas) will be held at El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA, October 22-24, 2013. This year’s conference has adopted as its main theme"Malware in the Era of Cloud Services and Mobile Endpoints" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular.
Fundamentally,Over the last 12 years three important dates have marked the beginnings of a major paradigm shift in computing and the security models applied to protect an emerging computing environment - March 1999, January 9th, 2007, and July 2007. These dates roughlycorrespond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date,Steve Jobs introduction ofthe Iphone,, and the discovery of the Zeus Botnet. These innovations have been instrumental in enablinga paradigm shift in computing, away from a corporate network centric model with Windows end-point devices to what we called the Circa 2020 Computing Model. In the circa 2020 Computing model applications and data reside in the Cloud, the concept of an extended Trust Domain (network) disappears - there are no barriers to protect when your data and applications reside with your vendors, and the end-point device is a SmartPhone owned and operated by your employee(BYOD).
Three major research trends have emerged within this context.First, at the end of the chain, the end-point device is a mobile BYOD with security and mobility properties never anticipated. If the end-point device is own and operated by the employee of a large corporation,and the boundaries between "personal" and "Corporate" data, as well as applications disappears, then what is the protection model that can be used? Is the device to be "trusted", Un-Trusted, or simply operates in different modes of protection.
Second, the existence of either a physical or a logical "Trusted Domain" that resides and operates within the confines of a single corporate entity has disappeared..
Finally, the protection model and measures to be applied within the context of the new computing/protection paradigm is an important challenge. Do we protect the data?, the applications?, and how do we measure protection?
Preliminary Program
Day 1 - October 22, 2013
7:00 - 9:00 AM
Registration & Breakfast
9:00 - 9:15 AM
Welcome Remarks - Dr. Fernando Colon Osorio, General Program Chair
9:15 - 10:15 AM
Keynote:" Hard Problems Face by the Security Industryin the Era of Cloud Services and Mobile Endpoints devices"
Mr. .Dennis Batchelder, Microsoft Malware Protection Center (MMPC)
10:15 - 10:30 AM
Break
10:30 - 12:30 PM:
Session # 1: Emerging threats and Malware classification
Session Chair: Dr. Colon Osorio
Manuscript # 1569803451 -Noninvasive Detection of Anti-Forensic Malware, by , Mordehai Gur, Gabi Kedma, Tom Sela, and Yuval Elovici, Ben-Gurion University, Israel
Manuscript # 1569803739 - Heuristic Malware Detection via Basic Block Comparison, by Francis Adkins & Luke Jones, Northeastern University, Martin Carlisle, US Air Force Academy, and Jason Upchurch, Intel Corporation, USA
Manuscript # 1569803757 -Dynamic Classification of Packing Algorithms for Inspecting Executables using Entropy Analysis, by Munkhbayar MB Bat-Erdene and Heejo Lee, Korea University, Korea.
12:30 - 01:30 PM
Lunch
01:30 - 03:00
Panel # 1 Targeted Advanced Persistent Threats - The New Horizon inthe Malware Wars
Moderator: Neil Ruben, PC Magazineking
Panelist:
Vikram Phatak, NSS Labs, USA
Peter Stelzhammer, AV-Comparatives, Austria, Grayson Milbourne, Webroot,
Chris Pickard, MRG-Effitas, UK, Jose Morales, Carnegie-Mellon, USA
03:00 - 03:15
Break
Day 1 - October 22, 2013 - Continued
03:15 - 05:15 PM
Session # 2: The Measurement Problem
Session Chair: Dr. Anthony Arrott
Manuscript # 1: TBA
Manuscript # 2: TBA
Manuscript # 3: TBA
05:15 -07:30 PM
Free Time
07:30 - 08:00 PM
Cocktail Reception
08:00 - 10:30 PM
"Best Paper" Award Gala Dinner
Day 2 - October 23, 2013
7:00 - 9:00 AM
Registration & Breakfast
9:00 - 09:45AM
Invited Paper
09:45 - 10:00 AM
Break
10:00 - 12:00 AM
Session # 3: Mobile Malware
Session Chair: Dennis Batchelder, Microsoft
Manuscript # 1569794723: It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit, byJoshua White & Jeanna Matthews, Clarkson University, USA
Manuscript # 1569803867 - First Byte: Force-Based Clustering of Filtered Block N-Grams to Detect Code Reuse in Malicious Software, by Jason Upchurch, United States Air Force Academy andXiaobo Zhou, University of Colorado at Colorado Springs, USA
12:00- 01:00 PM
LUNCH
01:00 - 02:30 PM:
Session # 4: :Cloud Computing Malware& Defenses
Session Chair: Dr. Anthony Arrott
Manuscript # 1569798893 - Countering Malware Evolution Using Cloud-Based Learning, by Jacob Ouellett, Twitter, USA; Avi Pfeffer, Charles River Analytics, USA; andArun Lakhotia, University of Louisiana at Lafayette, USA
Manuscript # 1569800307 -REcompile: A Decompilation Framework for Static Analysis of Binaries, by Khaled Yakdan and Sebastian Eschweiler, University of Bonn, Germany and Elmar Gerhards-Padilla, Fraunhofer FKIE, Germany
:1569803771 -Circumventing Keyloggers and Screendumps, by Karan Sapra, Benafsh Husain, Richard Brooks, and Melissa Smith, Clemson University, USA
Manuscript #1569801997 - Analysis and diversion of Duqu's driver, by Fabrice Sabatier & Aurélien Thierry, INRIA, France, and Guillaume Bonfante & Jean-Yves Marion, LORIA, France
Manuscript # 1569803467 - Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus, by Dennis Andriesse & Christian Rossow, VU University Amsterdam, The Netherlands, Brett Stone-Gross, Dell Secure Works, USA,Daniel Plohmann, Cyber Defense Research Group, Fraunhofer FKIE, Germany, and Herbert Bos, Vrije Universiteit, The Netherlands
Manuscript # 1569803789 - A Simple Client-Side Defense Against Environment-Dependent Web-Based Malware, Gen Lu, Karan Chadha, and Saumya Debray, University of Arizona, USA
04:30 - 05:00
Concluding Remarks - Dr. Fernando Colon Osorio, General Program Chair
Day 3 - October 24, 2013
Option # 1:
Workshop on the Future of Security & Security Products - Circa 2020o (By Invitation Only)
Sponsored by: Tend Micro Corporation & the Wireless Systems Security Research Laboratory (WSSRL)
7:00 - 9:00 AM
Registration & Breakfast
9:00 - 9:15 AM
Welcome Remarks - Dr. Fernando C.olon Osorio, General Program Chair
9:15 - 10:15 AM
KeyNote:TBA "
10:15 - 10:30 AM
Break
10:30 - 12:30 PM:
Session # 1: TBA
12:30 - 01:30 PM
Lunch
01:30 - 03:00
Panel # 2 The Anti-Malware EcoSystem
Moderator:Dr. Anthony Arrott
Panelist:
Dennis Batchelder, Microsoft Malware Protection Center, Prof. Mark Stamp, San Jose State University,Ferenc Leithold, Vezprog Labs, Bill McGee, Trend Micro Corp., Neil Rubenking, PC Magazine.
:
Day 3 - October 24, 2013 - Option # 2
08:00 - 09:00
Registration & Breakfast
09:00 - 12:00
Tour: El Yunque
The Caribbean National Rain Forest, known as El Yunque, is the only tropical forest in the United States National Forest System. It features a high impact rainforest hike along La Mina trail, a high impact trail of about 45 minutes hikes each way. Experience rushing waterfalls, take in the green canopy and enjoy a dip in the waterfall natural pool. This is a safe and comfortable hike where the guests will learn about the ecology and Taíno folklore of the forest with a local guide leading the way. Will visit other sites within the rain forest, will be at tour guides’ judgment.
Cost: $95.00 (Lunch Included)
Additional Information
For more information on Malware 2013or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair,
Malware 2013 at
or visit our web site www.malwareconference.org.