The 1st International Workshop on Malware Analysis
to be held in conjunction with the 11th International Conference on Availability, Reliability and Security
(ARES 2016 – http://www.ares-conference.eu)
August 31 – September 2, 2016
Salzburg, Austria
The volume and technical sophistication of malware are constantly increasing. Malware writers have recently developed advanced techniques to evade detection and attack strategies that increase the potential harm caused by malware. The large number and types of devices that can be affected by malware makes the malware detection problem of vital interest to a wide spectrum of computer users. Moreover, recent studies demonstrate that the evolutionary pace of evasion techniques has been much faster than that of anti-malware. This scenario makes urgent the development of a new generation of effective solutions for detecting and removing malware. For these reasons, WMA aims to bring together experts from academia, industry, government, and law enforcement who are interested in advancing the state of the art in malware analysis by exchanging their knowledge, results, ideas, and experiences. The goal of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas, with a sound academic backing. The focus of this workshop is not restricted to techniques for malware detection, but also includes discussion of new models of malware and guidelines for limiting malware diffusion that can be utilized by governments, industries, and other organizations to defend against cyber attacks.
Topics of interest comprise but are not limited to:
Anti-spam and anti-phishing techniques and practices Malware and its impact in social networking and cloud computing Analysis and measurements of real malware incidents Worms, viruses and other propagating Malware Spyware, keystroke loggers, information theft Malware Honeypots and other sample collection methodologies Botnet attacks, detection/tracking and defense Malware economics and black market studies Novel malware detection techniques |
Theoretical aspects and new directions in Broad Spectrum Malware related research Code reverse engineering tools and practices Malware performance, analysis and capture tools Targeted Attacks Smartphone Malware Malware for SCADA Systems Rootkit and virtualization techniques Malware in wireless mobile devices |
Best papers will be selected for publication in a Special Issue of the Journal in Computer Virology and Hacking Techniques, published by Springer Verlag. The workshop proceedings have been published by Conference Publishing Services (CPS).
Important Dates
Submission Deadline | April 25, 2016 |
Author Notification | May 30, 2016 |
Proceedings Version | June 20, 2016 |
Conference | August 31 – September 2, 2016 |
Workshop Chair
Mark Stamp (Chair)
University of San Josè, USA
mark.stamp[at]sjsu.edu
Corrado Aaron Visaggio (Chair)
University of Sannio, Italy
visaggio[at]unisannio.it
Program Committee
Shahid Alam, Qatar Foundation, Qatar
Thomas Austin, San Jose State University, USA
Lorenzo Cavallaro, Royal Holloway, University of London, United Kingdom
Marko Dimjašević, University of Utah, USA
Eric Filiol, ESIEA, France
Giorgio Giacinto, Università di Cagliari, Italy
Sotiris Ioannidis, Foundation for Research and Technology, Greece
David Marchette, Naval Surface Warfare Center, USA
Francesco Mercaldo, Università del Sannio, Italy
Vinod P Nair, SCMS School of Engineering & Technology,India
Yulei Pang, Southern Connecticut State University, USA
Antonella Santone, Università del Sannio, Italy
Andrea Saracino, Consiglio Nazionale delle Ricerche, Italy
Rakesh Verma, University of Houston, USA
Submission
The submission guidelines valid for the WMA workshop are the same as for the ARES conference. They can be found >>here<<.