conference programme
welcome drink
A welcome drink will be served on Wednesday, 25 July 2012 at 20:00 at the pool bar of the Capsis Astoria Hotel (conference hotel). Follow the signs inside the hotel to reach the location.
day 1
08:30 | Registration |
09:00 | Opening Remarks |
09:15![]() | Keynote: Industrial Control Systems Security Corrado Leita (Symantec Research Labs) |
10:15 | Coffee Break |
10:45 | Session I: Malware I |
---|---|
![]() | Using File Relationships in Malware Classification Nikos Karampatziakis, Anil Thomas, and Mady Marinescu (Microsoft Corporation), Jack W. Stokes (Microsoft Reasearch) |
![]() | Understanding DMA Malware Patrick Stewin, Iurii Bystrov (Security in Telecommunications - Technische Universitaet Berlin) |
Large-Scale Analysis of Malware Downloaders Christian Rossow (Institute for Internet Security, University of Applied Sciences Gelsenkirchen and Network Institute, VU University Amsterdam), Christian Dietrich (Institute for Internet Security, University of Applied Sciences Gelsenkirchen and Department of Computer Science, Friedrich-Alexander University), Herbert Bos (Network Institute, VU University Amsterdam) | |
12:15 | Lunch |
13:45![]() | Invited talk: The state of mobile security Manuel Egele (UC Santa Barbara) |
15:00 | Coffee Break |
15:30 | Session II: Mobile Security |
![]() | Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications Steve Hanna, Edward Wu, Saung Li, Charles Chen, Dawn Song (UC Berkeley), Ling Huang (Intel Labs) |
![]() | ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus Systems Min Zheng, Patrick P. C. Lee, John C. S. Lui (Dept. of Computer Science and Engineering, The Chinese University of Hong Kong) |
18:00 | End of Day |
20:00 | Social Event |
Social Event
The conference social event will be held in the evening of the first conference day at Cretaquarium . The bus to the location will depart from the conference hotel at 20:00.
day 2
09:00![]() | Invited talk: Defending Against Return-Oriented Programming Michalis Polychronakis (Columbia University) |
10:15 | Coffee Break |
10:45 | Session III: Malware II |
---|---|
![]() | A Static, Packer-Agnostic Filter to Detect Similar Malware Samples Gregoire Jacob (University of California, Santa Barbara and Telecom SudParis), Paolo Milani Comparetti, Matthias Neugschwandtner (Vienna University of Technology), Christopher Kruegel, Giovanni Vigna (University of California, Santa Barbara) |
![]() | Experiments with Malware Visualization Yongzheng Wu (Singapore University of Technology and Design), Roland H.C. Yap (School of Computing, National University of Singapore) |
![]() | Tracking Memory Writes for Malware Classification and Code Reuse Identification Andre Ricardo Abed Gregio (Renato Archer IT Research Center and University of Campinas), Paulo Licio de Geus (University of Campinas), Christopher Kruegel, Giovanni Vigna (University of California, Santa Barbara) |
12:15 | Lunch |
13:45 | Session IV: Secure Design |
![]() | System-level Support for Intrusion Recovery Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos (Network Institute, VU University Amsterdam) |
![]() | NetGator: Malware Detection Using Program Interactive Challenges Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou (The Center for Secure Information Systems, George Mason University) |
![]() | SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz (Horst Goertz Institute, Ruhr-University Bochum) |
15:15 | Coffee Break |
15:45 | Session V: IDS |
![]() | BISSAM: Automatic Vulnerability Identification of Office Documents Thomas Schreck, Stefan Berger, Jan Goebel (Siemens CERT) |
![]() | Self-organized Collaboration of Distributed IDS Sensors Karel Bartos (Faculty of Electrical Engineering Czech Technical University in Prague), Martin Rehak (Faculty of Electrical Engineering Czech Technical University in Prague and Cognitive-Security s.r.o.), Michal Svoboda (Cognitive-Security s.r.o.) |
![]() | Shedding Light on Log Correlation in Network Forensics Analysis Elias Raftopoulos, Matthias Egli, and Xenofontas Dimitropoulos (ETH Zurich) |
17:15 | Closing Remarks |