Registration for Malware Conference (MALCON 2015)

Registration for participants of Malware 2015 is now open. at this time.  To register as an attendee Click Here.

 

Malware 2015 Fee & Schedule:

 

Malware 2015 Technical Session registration fees include the Malware 2015 conference, all lunches, the conference award dinner & ceremony, and one copy of the proceedings in DVD format. Early registration deadline is September 1st, 2015. Expected fees for this year conference will remain at the same level as last year.

 

Registration Type

 

Technical Sessions Fees

 

IEEE Members

$1095 (late)

Non-IEEE Members

$1195 (late)

IEEE Student members

$615 (late)

NON- IEEE Student members

$715 (late)

 

Registration Guidelines:

Registration is not complete until payment has been received. (A printable form will be provided after submitting this form).

A receipt will not be provided until the conference.

Those attending Malware 2015 are eligible for special hotel rates at the Waldorf Astoria El Conquistador Resort, Fajardo Puerto Rico, USA. See hotel info for details. For the conference discounted fares please use code MAL15, and register by going to Hotel Reservations. By staying at the hotel not only do you receive an all inclusive great rate (including Taxes & Gratuities) but YOU HELP THE CONFERENCE.

Checks should be payable to Malware 2014, and must be drawn on either a U.S. bank or U.S. branch of a foreign bank.

Each attendee must use a separate registration form.

If you are not a presenting author, registration may be cancelled, but no later than September 1st, 2015 and may be subject to a 20% cancellation fee. Registrants who cancel beyond this date, or fail to attend, forfeit the registration fee.

PROGRAM

El Conquistador Hotel & Resort

1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA

7:15 am to 8:45 am

Breakfast and Registration

8:45 am to 9:00 am

Welcome, Conference Goals, and Introductions

Dr. Fernando C. Colon Osorio

WSSRL & Brandeis University

9:00 am to 10:15 am

Keynote -

Prof.  Vern Paxson, Professor of Electrical Engineering and Computer Sciences at the University of California, Berkeley

 

Topic: "Reflecting on the Evolution of Large-Scale Internet Attacks"

 

10:15 to 10:30 am

Break

10:30 am to 12:00 pm

 

Session Chair: Prof. Arun Lakhotia

Session 1 - Broad Spectrum Malware, Defense Strategies & Mechanisms

1570175373: "Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks",  Lanier Watkins and Kurt Silberberg, John Hopkins University, Jose Morales, Carnegie Mellon University & CERT, and William H. Robinson, Vanderbilt University

1570212787: "Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features", Joshua Saxe and Konstantin Berlin, Invincea Labs, LLC

1570177653: "Run-time Classification of Malicious Processes Using System Call Analysis", Raymond Canzanese, Jr., Spiros Mancoridis, Drexel University and Moshe Kam, New Jersey Institute of Technology

 

 

12:00 pm to 1:30 pm

Lunch & Affinity Group Discussions

Broad Spectrum Malware Group

Targeted Attacks Group

Measurement Group

Mobile Malware Group

01:30 pm to 03:30 pm

Panel Moderator:

Neil Rubenking

Panel Moderator - Neil Rubenking, PC Magazine

Topic: "Continuous Threat Analysis of you environment - from Home Network to the Enterprise Trust Zones" - Part I: The Paradigm Shift

 

Panelists:

Anthony Arrott, CheckVR, USA

Arun Lakhotia, University of Louisiana, Lafayette

John O'Brien, Microsoft

Alexander Volynkin, Senior Research Scientist CMU

Ivan Macalintal, Microsoft

Description:  With the emergence of Windows 10 and Windows 365, the idea that you can protect an end-point device has finally come to an end. Even in the home environment, there is no longer a single device that can be protected and its protection used as a measure of the "health/security of your system". In the home environment, the emerging paradigm is that of a Trusted Zone that includes:

a. multiple Windows computers;
b. a router with an embedded firewall;
c. a cloud based repository, e.g., google drive, or Microsoft one drive;
d. multiple "the Internet of things" devices - your thermostat, your electric meter, and so forth
e. others - name them
 
This two day panel  will discuss emerging metrics that attempt to capture what the health/security of your trusted zone looks like on a continuous basis. A key element of any such metric is the analysis of the threat landscape for your Trusted Zone. This means that the specific environment - i.e., the "Trusted Zone" characteristics are a critical element of such definition.
 
The panelist will attempt to take a first step in defining the metrics that can effectively characterize the health of the system under observation. 

 

03:30 pm to 03:45 pm

Break

03:45 pm to 05:00 pm

 

Session Chair: Dr. Jose A. Morales

Session 2 - Broad Spectrum Malware, Defense Strategies & Mechanisms

1570179643: "Variant: A Malware Similarity Testing Framework", Jason Upchurch, United States Air Force Academy & University of Colorado at Colorado Springs and Xiaobo Zhou, University of Colorado at Colorado Springs

 

1570179727: "A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation",  Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa and Alexander Pretschner, Technische Universität München

 

1570189045: "Automatically Combining Static Malware Detection Techniques", David De Lille, Bart Coppens, Bjorn De Sutter, Electronics and Information Systems, Ghent University, Belgium and Daan Raman, NVISO bvba, Belgium

 

 

 

El Conquistador Hotel & Resort

1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA

07:00 am to 8:00 am

Breakfast and Registration

08:00 am to 10:15 am

 

Session Chair: Prof. Arun Lakhotia

Session 3 - Mechanisms & Strategies to Thwart Attacks

 

1570179615: "Segmented Sandboxing - A Novel Approach to detecting Malware Polymorphisms", Fernando C. Colon Osorio, Hongyuan Qiu, Brandeis University & WSSRL Lab, USA and Anthony Arrott, CheckVr, Hungary & USA

 

1570212789:" Sandboxing and Reasoning on Malware Infection Trees", Krishnendu Ghosh, Miami University, Jose A. Morales, Carnegie Mellon University & CERT and William Casey, Software Engineering Institute, Carnegie Mellon University, USA

 

1570179765: "Covert Remote Syscall Communication at Kernel Level",  Florian Kerber, Dominik Teubert and Ulrike Meyer, RWTH Aachen University Germany

 

1570188307: "Gorille sniffs code similarities, the case study of Qwerty versus Regin", Guillaume Bonfante, Jean-Yves Marion and Fabrice Sabatier, LORIA, France

10:15 pm to 10:30 am

Break

10:30 pm to 12:30 pm

 

Session Chair: Fernando C. Colon Osorio

Session 4 - The Measurement Problem - Inherent Limitations of Current Measurement Frameworks

 

1570179969: "Measuring the information security risk in an infrastructure", Ferenc Leitold, Veszprog Ltd., Secudit Ltd. & National University of Public Service, Collage of Dunaú. jvárosKálmán Hadarics, Eszter Oroszi, Krisztina Győrffy

 

1570180069: "Measuring the health of antivirus ecosystems". Fanny Lalonde Lévesque and José M. Fernandez, École Polytechnique de Montréal, Canada, Anil Somayaji, Carleton University, Canada. Dennis Batchelder, Microsoft Corporation, USA

 

1570211675: "Stealthy Malware Traffic - Not as Innocent as It Looks". Xingsi Zhong, Yu Fu, Lu Yu and Richard Ree Brooks and G. Kumar Venayagamoorthy, Clemson University, USA

 

 

12:30 pm to 1:30 pm

Lunch & Affinity Group Discussions

Broad Spectrum Malware Group

Targeted Attacks Group

Measurement Group

Mobile Malware Group

01:30 pm to 03:00 pm

 

Panel Moderator: Jose A. Morales

Panel:

Topic: The growing role of digital forensics in criminal investigations

Panelist:

Software Engineering Institute: CERT: Forensics Operations and Investigations, Carnegie Mellon University:

Alexander Volynkin, Senior Research Scientist

Michael P. McCord, Software Vulnerability Analyst, 

Peter Troxell, Member of the Technical Staff

 

 

03:30 pm to 03:45 pm

Break

03:30 am to 05:15 pm

 

Session Chair: Dr. Fernando C. Colon Osorio

Session 5 -Mechanisms & Strategies to Detect Mobile Malware

 

Session 5 -Mechanisms & Strategies to Detect Mobile Malware

1570178721: "GroddDroid: a Gorilla for Triggering Malicious Behaviors", Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat and V. Viet Triem Tong, CentraleSupelec, Inria, Université de Rennes, France, Jean-Francois LaLande, INSA Centre Val de Loire, France

1570178829: "Clustering Android malware families by http traffic Counterfeit mobile devices", Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca and Giorgio Giacinto, Department of Electrical and Electronic Engineering, University of Cagliari, Italy

1570180209: "Targeted DoS on Android: How to disable Android in 10 seconds or less", Ryan Johnson and Angelos Stavrou, Kryptowire, Mohamed Elsabagh, George Mason University, USA , Vincent Sritapan, Department of Homeland Security, S&T, Washington, D.C., USA

1570212633 - "Counterfeit mobile devices",  John O’Brien, Microsoft, Ireland and Kimmo Lehtonen, Microsoft

 

05:15 pm to 05:30

 

Closing Remarks - Dr. Fernando C. Colon Osorio, General Program Chair

 

 

 

El Conquistador Hotel & Resort

1000 El Conquistador Avenue, Fajardo, Puerto Rico, USA

07:00 am to 8:00 am

Breakfast and Registration

08:00 am to 12:15 am

 

 

Concurrent Sessions

 

Session A: Workshop

 

 

Session B: Penetration Testing Tutorial - Assessing Your Overall Security Before the Attackers do.

 

What is Pen-Testing?

Why Perform Pen-Testing?

Pen-Testing Tools And Reporting

Analysis Of CORE IMPACT

Metasploit Framework 3.0

12:15 pm to 01:15 pm

Lunch

01:15 pm to 05:00 pm

 

Session Chair: Dr. Jose A. Morales

2nd Annual Capture The Flag Contest as part of the

10th IEEE Technically Sponsored International Conference on Malicious and Unwanted Software  (MALCON 2015)

 

First Price (Must capture all 5 flags)

 

$1,000.00 USD

2nd Price

 

Certificate 2nd Place

3rd Price

Certificate 3rd Place

 

Winners will be announced and prizes awarded at the end of the MALCON 2015 Conference.

All participants in the conference are welcomed to form a team.

For Further Information contact:

Dr. Jose A. Morales, CFT Organizer

and/or

Mr. Dan Klinedinst, CTF Organizer

 

 


 

 

09:00 am to 03:45 pm

 

Culebra Getaway Networking Event - Beach and Snorkel Tour & Day Trip

Details:

 

 

Check in time: 9:00am

• Departing: Lobby, El Conquistador Hotel & Resort, Fajardo Puerto Rico

 

Includes:

• Lunch buffet with options for all

• Beverages, including rum drinks

• Quality snorkeling equipment for all ages

• Floating devices

• Swim platforms where our guest have easy access to the water

• Snorkeling instruction for our beginners

 Cost:  $ 125.00 pp    

Upon departing marina Puerto Del Rey, we head straight out to Culebra along  the Cordillera Islands. After about 45 minutes on our high-speed catamaran we arrive at one of Culebra’s beautiful reefs and anchor for about an hour and a half of snorkeling. Depending on water condition our captains may take you to: Luis Pena, Carlos Rosario, or Melones

We then move on to our beach stop, Culebrita, Playa Tortuga or another beautiful beach that will be the best to enjoy the rest of the afternoon. At either location you can swim into the beach or do some more snorkeling.  We depart Culebra around 3:00 pm, returning to the marina between 3:45- 4:00pm.

Lunch is served at approximately 11:45-12:00pm, where our guests can enjoy local pastries; build your own sandwiches with fresh baked bread, fresh fruit, our signature pasta salad, chicken salad, coleslaw and cookies.

 Important: Be advised that this Snorkeling beach Trip travels by high speed boat in open waters and may not be appropriate for pregnant women, those with recent surgeries, back injuries and children under 3 yrs of age.

If you tend to get seasick, we remind you that you should take an over-the-counter remedy with food at least 1 hour before the voyage.

 

 

SUBMISSION GUIDELINES

Manuscripts and registrations due: July 8th, 2015 and August 12th, 2015: 11:59:59 EST

 

 

 

Submitted manuscripts must have at least 11-point font size, and should not exceed 8 single-spaced pages in length, including the abstract, figures, and references. Authors working for the government or government related projects, as well as authors working for private corporations, should obtain company and government clearances prior to submission of papers.

 

Authors should use the approved conference templates only for their manuscripts. The Templates can be downloaded here. Word or Latex

IEEE Copyright form can be found here. Copyright HTML or PDF.

To submit a manuscript :

Click here to submit paper with Editor's Assistant (EDAS).

Manuscripts and registrations due: July 8th, 2015: 11:59:59 EST

The program committee will review all manuscripts. The manuscripts will be judged with respect to their quality, originality, and relevance will review all papers. While all papers will be considered for full papers, a small number of papers may be accepted as short papers. All accepted papers will be published in the conference proceedings, conditional upon the author's advance registration. Note that one full (non-student) registration fee must be paid for each paper published in the proceedings.

 

Call for Papers & Frequently Asked Questions

 

 

Submission of papers

 

Research Track

Julky 8th, 2015, 23:59:59 EST

Industry Track

August 12th, 2015, 23:59:59 EST

Short Paper Track

August 12th,, 2015, 23:59:59 EST

Notification of Acceptance

September 1st, 2015, 23:59:59 EST

Camera ready paper:

September 8th, 2015: 23:59:59 EST

Conference dates

October 20-22, 2015

 

Click Here to get a copy of the CFP

Click Here to Submit a Manuscript

Travel Arrangements

The 10th IEEE International Conference on Malicious and Unwanted Software "The Americas" (MALCON 2015) will be held at El Conquistador Hotel & Resort, Fajardo, Puerto Rico, USA, October 20-22, 2015. In this section we address the typical questions that you may have in making the necessary travel arrangements.