header image
Home arrow Preliminary Program
Malware 2013 - Preliminary Program
Written by Administrator   
Friday, 14 September 2012
Preliminary Program


8th IEEE International Conference on Malicious and Unwanted Software "The Americas"

Preliminary Program

Theme: "Malware in the Era of Cloud Services and Mobile Endpoints"

October 22-24, 2013 - El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA

 The 8th IEEE International Conference on Malicious and Unwanted Software "The Americas" (Malware 2013 The Americas) will be held at El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA, October 22-24, 2013. This year’s conference has adopted as its main theme "Malware in the Era of Cloud Services and Mobile Endpoints" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular.


Fundamentally,  Over the last 12 years three important dates have marked the beginnings of a major paradigm shift in computing and the security models applied to protect an emerging computing environment - March 1999, January 9th, 2007, and July 2007. These dates roughly  correspond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date,  Steve Jobs introduction of  the Iphone,, and the discovery of the Zeus Botnet. These innovations have been instrumental in enabling  a paradigm shift in computing, away from a corporate network centric model with Windows end-point devices to what we called the Circa 2020 Computing Model. In the circa 2020 Computing model applications and data reside in the Cloud, the concept of an extended Trust Domain (network) disappears - there are no barriers to protect when your data and applications reside with your vendors, and the end-point device is a SmartPhone owned and operated by your employee  (BYOD).


Three major research trends have emerged within this context.  First, at the end of the chain, the end-point device is a mobile BYOD with security and mobility properties never anticipated. If the end-point device is own and operated by the employee of a large corporation,  and the boundaries between "personal" and "Corporate" data, as well as applications disappears, then what is the protection model that can be used? Is the device to be "trusted", Un-Trusted, or simply operates in different modes of protection.


Second, the existence of either a physical or a logical "Trusted Domain" that resides and operates within the confines of a single corporate entity has disappeared..


Finally, the protection model and measures to be applied within the context of the new computing/protection paradigm is an important challenge. Do we protect the data?, the applications?, and how do we measure protection?


Preliminary Program


Day 1 - October 22, 2013


 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 9:15 AM

Welcome Remarks - Dr. Fernando Colon Osorio, General Program Chair

 9:15 - 10:15 AM

Keynote:" Hard Problems Face by the Security Industry  in the Era of Cloud Services and Mobile Endpoints devices"

Mr. .Dennis Batchelder, Microsoft Malware Protection Center (MMPC)

10:15 - 10:30 AM


10:30 - 12:30 PM:

Session # 1:  Emerging threats and Malware classification


Session Chair: Dr. Colon Osorio


Manuscript # 1569803451 -  Noninvasive Detection of Anti-Forensic Malware, by , Mordehai Gur, Gabi Kedma, Tom Sela, and Yuval Elovici, Ben-Gurion University, Israel


Manuscript # 1569803739 - Heuristic Malware Detection via Basic Block Comparison, by Francis Adkins & Luke Jones, Northeastern University, Martin Carlisle, US Air Force Academy, and Jason Upchurch, Intel Corporation, USA


Manuscript # 1569803757 -  Dynamic Classification of Packing Algorithms for Inspecting Executables using Entropy Analysis, by Munkhbayar MB Bat-Erdene and Heejo Lee, Korea University, Korea.



12:30 - 01:30 PM


01:30 - 03:00

Panel # 1 Targeted Advanced Persistent Threats - The New Horizon in  the Malware Wars


Moderator: Neil Ruben, PC Magazineking



Vikram Phatak, NSS Labs, USA

Peter Stelzhammer, AV-Comparatives, Austria,  Grayson Milbourne, Webroot,

Chris Pickard, MRG-Effitas, UK,   Jose Morales, Carnegie-Mellon, USA

03:00 - 03:15


Day 1 - October 22, 2013 - Continued

03:15 - 05:15 PM

Session # 2: The Measurement Problem


Session Chair: Dr. Anthony Arrott


Manuscript # 1: TBA


Manuscript # 2: TBA


Manuscript # 3: TBA


 05:15 -07:30 PM

Free Time

07:30 - 08:00 PM

Cocktail Reception

08:00 - 10:30 PM

"Best Paper" Award Gala Dinner



Day 2 - October 23, 2013


 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 09:45  AM

Invited Paper

09:45 - 10:00 AM


 10:00 - 12:00 AM

Session # 3: Mobile Malware


Session Chair: Dennis Batchelder, Microsoft


Manuscript # 1569794723: It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit, by  Joshua White & Jeanna Matthews, Clarkson University, USA


Manuscript # 1569803769: PANDORA Applies Non-Deterministic Obfuscation Randomly to Android, by Mykola Protsenko  and Tilo Müller, Friedrich-Alexander University Erlangen-Nuremberg, Germany


Manuscript # 1569803867 - First Byte: Force-Based Clustering of Filtered Block N-Grams to Detect Code Reuse in Malicious Software, by Jason Upchurch, United States Air Force Academy and  Xiaobo Zhou, University of Colorado at Colorado Springs, USA

12:00  - 01:00 PM


01:00 - 02:30 PM:

Session # 4: :Cloud Computing Malware  & Defenses


Session Chair: Dr. Anthony Arrott

Manuscript # 1569798893 - Countering Malware Evolution Using Cloud-Based Learning, by Jacob Ouellett, Twitter, USA; Avi Pfeffer, Charles River Analytics, USA; and  Arun Lakhotia, University of Louisiana at Lafayette, USA


Manuscript # 1569800307 -  REcompile: A Decompilation Framework for Static Analysis of Binaries, by Khaled Yakdan and Sebastian Eschweiler, University of Bonn, Germany and Elmar Gerhards-Padilla, Fraunhofer FKIE, Germany


:1569803771 -  Circumventing Keyloggers and Screendumps, by Karan Sapra, Benafsh Husain, Richard Brooks, and Melissa Smith, Clemson University, USA

02:45 - 03:00 PM


03:00 - 04:30 PM

Session # 5: Botnets, Targeted Advances Persistent Threats


Session Chair: Dr. Anthony Arrott


Manuscript # 1569801997 - Analysis and diversion of Duqu's driver, by Fabrice Sabatier & Aurélien Thierry, INRIA, France, and Guillaume Bonfante & Jean-Yves Marion, LORIA, France


Manuscript # 1569803467 - Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus, by Dennis Andriesse & Christian Rossow, VU University Amsterdam, The Netherlands, Brett Stone-Gross, Dell Secure Works, USA,  Daniel Plohmann, Cyber Defense Research Group, Fraunhofer FKIE, Germany, and Herbert Bos, Vrije Universiteit, The Netherlands


Manuscript # 1569803789 - A Simple Client-Side Defense Against Environment-Dependent Web-Based Malware, Gen Lu, Karan Chadha, and Saumya Debray, University of Arizona, USA

04:30 - 05:00

Concluding Remarks - Dr. Fernando Colon Osorio, General Program Chair




Day 3 - October 24, 2013


Option # 1:

Workshop on the Future of Security & Security Products - Circa 2020o (By Invitation Only)

Sponsored by: Tend Micro Corporation & the Wireless Systems Security Research Laboratory (WSSRL)

 7:00 - 9:00 AM

Registration & Breakfast

 9:00 - 9:15 AM

Welcome Remarks - Dr. Fernando C.olon Osorio, General Program Chair

 9:15 - 10:15 AM

KeyNote:  TBA "

10:15 - 10:30 AM


10:30 - 12:30 PM:

Session # 1:  TBA



12:30 - 01:30 PM


01:30 - 03:00

Panel # 2  The Anti-Malware EcoSystem


Moderator:  Dr. Anthony Arrott



Dennis Batchelder, Microsoft Malware Protection Center, Prof. Mark Stamp, San Jose State University,  Ferenc Leithold, Vezprog Labs, Bill McGee, Trend Micro Corp., Neil Rubenking, PC Magazine.




Day 3 - October 24, 2013 - Option # 2

08:00 - 09:00

Registration & Breakfast

09:00 - 12:00



Tour: El Yunque




The Caribbean National Rain Forest, known as El Yunque, is the only tropical forest in the United States National Forest System. It features a high impact rainforest hike along La Mina trail, a high impact trail of about 45 minutes hikes each way. Experience rushing waterfalls, take in the green canopy and enjoy a dip in the waterfall natural pool. This is a safe and comfortable hike where the guests will learn about the ecology and Taíno folklore of the forest with a local guide leading the way. Will visit other sites within the rain forest, will be at tour guides’ judgment.


Cost: $95.00 (Lunch Included)


Additional Information

For more information on Malware 2013  or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair,

Malware 2013 at or visit our web site www.malwareconference.org.



Last Updated ( Sunday, 01 September 2013 )
Malware 2012 -  Best Paper Award - "ROP Payload Detection Using Speculative Code Execution"
Where shall the Malware Conference 2014 Be Held?