Snort mailing list archives
RAID 2015 Call for Participation
From: Giorgos Vasiliadis <gvasil () ics forth gr>
Date: Thu, 15 Oct 2015 17:42:47 +0300
****************************************************************************** The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID2015) Kyoto, Japan -- November 2-5, 2015 http://www.raid2015.org/ <http://www.raid2015.org/> ****************************************************************************** ** Program now available! ** <ABOUT THE CONFERENCE> The 18th International Symposium on Research in Attacks, Intrusions and Defenses, previously known as Recent Advances in Intrusion Detection, will be held in Kyoto, Japan. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions and technologies related to intrusion detection, attacks and defenses. The RAID Symposium 2015 is organized as a 4-day event featuring: - 28 scientific paper presentation in 3 days (November 2-4) - 1 co-located workshop (November 5) - 2 social events <VENUE> "Kyoto Terrsa" Address: Shimotonoda-cho Higashi-Kujo, Minami-ku, Kyoto, Japan http://www.raid2015.org/venue.html <http://www.raid2015.org/venue.html> <COMMITTEES> General Chair: Youki Kadobayashi (NAIST) PC Chair: Herbert Bos (Vrije Universiteit/VU University Amsterdam) PC Co-Chair: Fabian Monrose (University of North Carolina at Chapel Hill) <REGISTRATION> Registration information is available at: http://www.raid2015.org/registration.html <http://www.raid2015.org/registration.html> Early registration fees apply until October 1, 2015. <HOTEL> We reserved 100 rooms in Kyoto city during the RAID symposium. The reservation procedures and details are available on the following page. http://www.raid2015.org/hotel.html <http://www.raid2015.org/hotel.html> Even if you do not need a reservation for the listed hotels, we strongly recommend that you make a hotel reservation as early as possible, as November is the tourist season in Kyoto and you may have difficulty finding hotels at the last minute. <PROGRAM> Monday, November 2, 2015 ------------------------ 08:30-09:00 Registration 09:00-09:15 Opening 09:15-10:15 Keynote: Mark Seaborn, Google 10:15-10:30 Coffee Break 10:30-12:30 Session 1: Cool Stuff You Can Do with Hardware - Ensemble Learning for Low-level Hardware-supported Malware Detection Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev - Physical-layer Detection of Hardware Keyloggers Ryan M. Gerdes; Saptarshi Mallick - Reverse Engineering Intel Complex Addressing Using Performance Counters Clementine Maurice; Nicolas Le Scouarnec; Christoph Neumann; Olivier Heen; Aurelien Francillon - Hardware-Assisted Fine-Grained Code-Reuse Attack Detection Pinghai Yuan; Xuhua Ding; Qingkai Zeng 12:30-14:00 Lunch 14:00-15:30 Session 2: Networks - Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors Jaehyun Nam; Muhammad Jamshed; Byungkwon Choi; Dongsu Han; KyoungSoo Park - Demystifying the IP Blackspace Quentin Jacquemart; Pierre-Antoine Vervier; Guillaume Urvoy-Keller; Ernst Biersack - Providing Dynamic Control to Passive Network Security Monitoring Johanna Amann; Robin Sommer 15:30-16:00 Coffee Break 16:00-17:30 Session 3: Hardening - Probabilistic Inference on Integrity for Access Behavior Based Malware Detection Weixuan Mao; Zhongmin Cai; Xiaohong Guan; Don Towsley - Counteracting Data-Only Malware with Code Pointer Examination Thomas Kittel; Sebastian Vogl; Julian Kirsch; Claudia Eckert - Xede: Practical Exploit Early Detection Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng 19:00-21:00 Banquet Tuesday, November 3, 2015 ------------------------ 08:30-09:00 Registration 09:00-10:30 Session 4: Attack Detection 1 - Preventing Exploits in Microsoft Office Documents through Content Randomization Charles Smutz; Angelos Stavrou - Improving accuracy of static integer overflow detection in binary Yang Zhang; Xiaoshan Sun; Yi Deng; Liang Cheng; Shuke Zeng; Yu Fu; Dengguo Feng - A Formal Framework for Program Anomaly Detection Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder 10:30-11:00 Coffee Break 11:00-12:30 Session 5: Web and Net - jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications Giancarlo Pellegrino; Constantin Tschuertz; Eric Bodden; Christian Rossow - WYSISNWIV: What You Scan Is Not What I Visit Qilang Yang; Dimitrios Damopoulos; Georgios Portokalidis - SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks Christian Roepke; Thorsten Holz 12:30-14:00 Lunch 14:00-15:30 Session 6: Android - AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware Wenbo Yang; Juanru Li; Bodong Li; Junliang Shu; Wenjun Hu; Yuanyuan Zhang; Dawu Gu - Dissecting and Detecting Android Ransomware Federico Maggi; Nicolo Andronio; Stefano Zanero - Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users Rahul Murmuria; Angelos Stavrou; Daniel Barbara; Dan Fleck 15:30-16:00 Coffee 16:00-17:00 Session 7: Privacy - Privacy Risk Assessment on Online Photos Haitao Xu; Haining Wang; Angelos Stavrou - Privacy is Not an Option: Attacking the IPv6 Privacy Extension Johanna Ullrich; Edgar Weippl; Johanna Ullrich 17:00-18:30 Poster Session 19:00-21:30 Reception Wednesday, November 4, 2015 ------------------------ 08:30-09:00 Registration 09:00-11:00 Session 8: Evaluating Solutions - Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection Aleksandar Milenkoski; Bryan D. Payne; Nuno Antunes; Marco Vieira; Samuel Kounev; Alberto Avritzer; Matthias Luft - Security Analysis of PHP Bytecode Protection Mechanisms Dario Weisser; Johannes Dahse; Thorsten Holz - Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks Mohamed Elsabagh; Daniel Barbara; Daniel Fleck; Angelos Stavrou - Towards Automatic Inference of Kernel Object Semantics from Binary Code Junyuan Zeng; Zhiqiang Lin 11:00-11:30 Coffee Break 11:30-13:00 Session 9: Attack Detection 2 - BotWatcher: Transparent and Generic Botnet Tracking Thomas Barabosch; Adrian Dombeck; Khaled Yakdan; Elmar Gerhards-Padilla - Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting Yangyi Chen; Vincent Bindschaedler; Xiaofeng Wang; Stefan Berger; Dimitrios Pendarakis - AmpPot: Monitoring and Defending Amplification DDoS Attacks Lukas Kraemer; Johannes Krupp; Daisuke Makita; Tomomi Nishizoe; Takashi Koide; Katsunari Yoshioka; Christian Rossow 13:00-13:15 Closing Thursday, November 5, 2015 ------------------------ Workshop: BADGERS 2015 (http://www.necoma-project.eu/badgers-2015/ <http://www.necoma-project.eu/badgers-2015/>) <MORE INFORMATION> Additional information about the symposium can be found at: http://www.raid2015.org/ <http://www.raid2015.org/>
------------------------------------------------------------------------------
_______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- RAID 2015 Call for Participation Giorgos Vasiliadis (Oct 15)