Honeypots mailing list archives

Call for Participation - DIMVA 2009


From: Sebastian Schmerl <sbs () Informatik TU-Cottbus DE>
Date: Tue, 26 May 2009 12:59:20 +0200

  (We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------
                C A L L F O R P A R T I C I P A T I O N
======================================================================

                              DIMVA 2009

                  Sixth International Conference on
    Detection of Intrusions and Malware & Vulnerability Assessment


                      Organized by GI SIG SIDAR

                             Como, Italy
                           July 9-10, 2009

                   http://www.dimva.org/dimva2009
                        mailto:info () dimva org
======================================================================

The annual  DIMVA conference serves  as a premier forum  for advancing
the state  of the art  in intrusion detection, malware  detection, and
vulnerability   assessment.    Each   year   DIMVA   brings   together
international  experts  from  academia,  industry  and  government  to
present and discuss novel research  in these areas. DIMVA is organized
by  the special  interest  group Security  -  Intrusion Detection  and
Response  (SIDAR) of  the  German  Informatics  Society (GI) and takes
place 9/10-07-2009 in Como, Italy.

This year's program features a single technical track with 13 papers
DIMVA 2009 will also feature two invited talks by renowned experts:

* Henry Stern, Ironport / Cisco:
  A New Era in Security Collaboration: Turning the Tables on Botnets

* Richard Kemmerer, University of California Santa Barbara
  How to Steal a Botnet and What Can Happen When You Do

The conference program will be complemented by

* a Rump Session: a series of short and entertaining talks where
  attendees can present recent research results, work in progress,
  or other topics of interest to the community.

  Please contact the Rump Session Chair, Sven Dietrich, at
  rump-chair () dimva org for submission questions.

* CIPHER 5: a "Capture The Flag"-style contest in IT security for
  teams of students from universities around the world. CIPHER is
  co-arranged by the Special Interest Group SIDAR (Security - Intrusion
  Detection and Response) of the German Informatics Society (GI).
  (More information on http://www.cipher-ctf.org)

Registration and Travel
=======================

The  DIMVA  2009  conference  will   be  held  in  Como (Italy).   The
registration  is  now  open.  Please  check  the  DIMVA  web  site for
information on the rates, registration, travel and accommodation:

                !!!Early Bird Rates available now!!!

                  http://www.dimva.org/dimva2009


Conference Program (preliminary)
================================

Thursday, July 9th
------------------

Welcome Opening Remarks

Session 1: Malware and SPAM

  A Case Study on Asprox Infection Dynamics

  How good are malware detectors at remediating infected systems?

  Towards Proactive Spam Filtering


Session 2: Emulation-based Detection

  Shepherding Loadable Kernel Module through On-demand
  Emulation

  Yataglass: Network-level Code Emulation for Analyzing
  Memory-scanning Attacks

  Defending Browsers against Drive-by Downloads: Mitigating
  Heap-spraying Code Injection Attacks

Keynote

  How to Steal a Botnet and What Can Happen When You Do
    Richard Kemmerer, University of California Santa Barbara

Session 3: Software Diversity

  Polymorphing Software by Randomizing Data Structure Layout

  On the Effectiveness of Software Diversity: A Systematic
  Study on Real-World Vulnerabilities

SIG SIDAR Open Meeting

Friday, July 10th
-----------------

Keynote

  A New Era in Security Collaboration: Turning the Tables on
  Botnets
    Henry Stern, Ironport / Cisco

Session 4: Harnessing Context

  Using Contextual Information for IDS Alarm Classification

  Browser Fingerprinting from Coarse Traffic Summaries:
  Techniques and Implications

  A Service Dependency Modeling Framework for Policy-based
  Response Enforcement

Rump Session

Session 5: Anomaly Detection

  Learning SQL for Database Intrusion Detection using
  Context-Sensitive Modelling

  Selecting and Improving System Call Models for Anomaly
  Detection

CIPHER 5 Capture the Flag

Farewell - Concluding Remarks


Corporate Sponsors
==================
We  solicit  interested  organizations  to serve as sponsors for DIMVA
2009, particularly in sponsorship of student travel and other expenses
for  DIMVA. Please  contact  the  Sponsorship  Chair  for  information
regarding corporate sponsorship of DIMVA 2009.

Organizing Committee
====================
 General Chair: Danilo M. Bruschi,
                Università degli Studi di Milano,
                Italy (info () dimva org)
 Program Chair: Ulrich Flegel, SAP Research CEC Karlsruhe,
                Germany (pc-chair () dimva org)
 Rump Session Chair: Sven Dietrich,
                Stevens Institute of Technology,
                U.S.A. (rump-chair () dimva org)
 Sponsorship Chair: Thorsten Holz, University of Mannheim,
                Germany (sponsor-chair () dimva org)
 Publicity Chair: Sebastian Schmerl,
                Technical University of Cottbus,
                Germany (publicity-chair () dimva org)

Program Committee
=================
Thomas Biege, Novell, Germany
Gunter Bitz, SAP AG, Germany
Herbert Bos, Vrije Universiteit Amsterdam, Netherlands
Danilo Bruschi, Università degli Studi di Milano, Italy
Roland Büschkes, RWE, Germany
Marc Dacier, Symantec Research, France
Hervé Debar, France Télécom, France
Sven Dietrich, Stevens Institute of Technology, U.S.A.
Toralv Dirro, McAfee, Germany
Thomas Dullien, Zynamics, Germany
Ulrich Flegel, SAP Research, Germany
Bernhard Hämmerli, Acris GmbH & HSLU Lucerne, Switzerland
Marc Heuse, Baseline Security, Germany
Thorsten Holz, University of Mannheim, Germany
Erland Jonsson, Chalmers University, Sweden
Klaus Julisch, IBM Zurich Research Laboratory, Switzerland
Engin Kirda, Eurecom, France
Christian Kreibich, International Computer Science Institute,
  U.S.A.
Christopher Kruegel, University of California in Santa Barbara,
  U.S.A
Pavel Laskov, University of Tuebingen, Germany
Wenke Lee, Georgia Institute of Technology, U.S.A.
Javier Lopez, University of Malaga, Spain
John McHugh, University of North Carolina and Dalhousie
  University Halifax, Canada
Michael Meier, Technical University of Dortmund, Germany
George Mohay, Queensland University of Technology, Australia
Martin Rehák, Czech Technical University, Czech
Konrad Rieck, Technical University of Berlin, Germany
Sebastian Schmerl, Technical University of Cottbus, Germany
Robin Sommer, ICSI/LBNL, U.S.A.
Salvatore Stolfo, Columbia University, U.S.A
Peter Szor, Symantec, U.S.A.
Bernhard Thurm, SAP Research, Germany
Al Valdes, SRI International, U.S.A.

Steering Committee
==================
 Chairs:
 * Ulrich Flegel, SAP Research CEC Karlsruhe
 * Michael Meier, Technical University of Dortmund

Members:
 * Roland Büschkes, RWE
 * Hervé Debar, France Telecom R&D
 * Bernhard Hämmerli, Acris GmbH, HSLU
 * Marc Heuse, Baseline Security Consulting
 * Klaus Julisch, IBM Zurich Research Lab
 * Christopher Kruegel, UC Santa Barbara
 * Pavel Laskov, University of Tuebingen
 * Robin Sommer, ICSI/LBNL
 * Diego Zamboni, IBM Zurich Research Lab




-- 
_____________________________________________________________________
Sebastian Schmerl                          Tel: +49 (0) 355 69 20 29
sbs () informatik tu-cottbus de               Fax: +49 (0) 355 69 21 27
                               BTU Cottbus

               Computer Networks and Communication System
                P.O.Box 10 13 44, 03013 Cottbus, Germany
                http://www-rnks.informatik.tu-cottbus.de
_____________________________________________________________________









Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


Current thread: