<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">******************************************************************************<br class="">The 18th International Symposium on Research in Attacks, Intrusions and<br class="">Defenses (RAID2015)<br class="">Kyoto, Japan -- November 2-5, 2015<br class=""><a href="http://www.raid2015.org/" class="">http://www.raid2015.org/</a><br class="">******************************************************************************<br class=""><br class="">** Program now available! **<br class=""><br class=""><ABOUT THE CONFERENCE><br class="">The 18th International Symposium on Research in Attacks, Intrusions<br class="">and Defenses, previously known as Recent Advances in Intrusion<br class="">Detection, will be held in Kyoto, Japan. This symposium brings<br class="">together leading researchers and practitioners from academia,<br class="">government, and industry to discuss novel security problems, solutions<br class="">and technologies related to intrusion detection, attacks and defenses.<br class=""><br class="">The RAID Symposium 2015 is organized as a 4-day event featuring:<br class="">- 28 scientific paper presentation in 3 days (November 2-4)<br class="">- 1 co-located workshop (November 5)<br class="">- 2 social events<br class=""><br class=""><br class=""><VENUE><br class="">"Kyoto Terrsa"<br class="">Address: Shimotonoda-cho Higashi-Kujo, Minami-ku, Kyoto, Japan<br class=""><a href="http://www.raid2015.org/venue.html" class="">http://www.raid2015.org/venue.html</a><br class=""><br class=""><br class=""><COMMITTEES><br class="">General Chair: Youki Kadobayashi (NAIST)<br class="">PC Chair: Herbert Bos (Vrije Universiteit/VU University Amsterdam)<br class="">PC Co-Chair: Fabian Monrose (University of North Carolina at Chapel Hill)<br class=""><br class=""><br class=""><REGISTRATION><br class="">Registration information is available at:<br class=""><a href="http://www.raid2015.org/registration.html" class="">http://www.raid2015.org/registration.html</a><br class=""><br class="">Early registration fees apply until October 1, 2015.<br class=""><br class=""><br class=""><HOTEL><br class="">We reserved 100 rooms in Kyoto city during the RAID symposium. <br class="">The reservation procedures and details are available on the following page.<br class=""><a href="http://www.raid2015.org/hotel.html" class="">http://www.raid2015.org/hotel.html</a><br class=""><br class="">Even if you do not need a reservation for the listed hotels, we<br class="">strongly recommend that you make a hotel reservation as early as<br class="">possible, as November is the tourist season in Kyoto and you may have<br class="">difficulty finding hotels at the last minute.<br class=""><br class=""><br class=""><PROGRAM><br class="">Monday, November 2, 2015 <br class="">------------------------<br class="">08:30-09:00 Registration<br class=""><br class="">09:00-09:15 Opening <br class=""><br class="">09:15-10:15 Keynote: Mark Seaborn, Google<br class=""><br class="">10:15-10:30 Coffee Break<br class=""><br class="">10:30-12:30 Session 1: Cool Stuff You Can Do with Hardware<br class="">- Ensemble Learning for Low-level Hardware-supported Malware Detection<br class=""> Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev<br class="">- Physical-layer Detection of Hardware Keyloggers<br class=""> Ryan M. Gerdes; Saptarshi Mallick<br class="">- Reverse Engineering Intel Complex Addressing Using Performance Counters<br class=""> Clementine Maurice; Nicolas Le Scouarnec; Christoph Neumann; Olivier Heen; Aurelien Francillon<br class="">- Hardware-Assisted Fine-Grained Code-Reuse Attack Detection<br class=""> Pinghai Yuan; Xuhua Ding; Qingkai Zeng <br class=""><br class="">12:30-14:00 Lunch<br class=""><br class="">14:00-15:30 Session 2: Networks<br class="">- Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors<br class=""> Jaehyun Nam; Muhammad Jamshed; Byungkwon Choi; Dongsu Han; KyoungSoo Park<br class="">- Demystifying the IP Blackspace<br class=""> Quentin Jacquemart; Pierre-Antoine Vervier; Guillaume Urvoy-Keller; Ernst Biersack<br class="">- Providing Dynamic Control to Passive Network Security Monitoring<br class=""> Johanna Amann; Robin Sommer <br class=""><br class="">15:30-16:00 Coffee Break<br class=""><br class="">16:00-17:30 Session 3: Hardening<br class="">- Probabilistic Inference on Integrity for Access Behavior Based Malware Detection<br class=""> Weixuan Mao; Zhongmin Cai; Xiaohong Guan; Don Towsley<br class="">- Counteracting Data-Only Malware with Code Pointer Examination<br class=""> Thomas Kittel; Sebastian Vogl; Julian Kirsch; Claudia Eckert<br class="">- Xede: Practical Exploit Early Detection<br class=""> Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng <br class=""><br class="">19:00-21:00 Banquet<br class=""><br class=""><br class="">Tuesday, November 3, 2015 <br class="">------------------------<br class="">08:30-09:00 Registration<br class=""><br class="">09:00-10:30 Session 4: Attack Detection 1 <br class="">- Preventing Exploits in Microsoft Office Documents through Content Randomization<br class=""> Charles Smutz; Angelos Stavrou<br class="">- Improving accuracy of static integer overflow detection in binary<br class=""> Yang Zhang; Xiaoshan Sun; Yi Deng; Liang Cheng; Shuke Zeng; Yu Fu; Dengguo Feng<br class="">- A Formal Framework for Program Anomaly Detection<br class=""> Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder<br class=""><br class="">10:30-11:00 Coffee Break<br class=""><br class="">11:00-12:30 Session 5: Web and Net <br class="">- jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications<br class=""> Giancarlo Pellegrino; Constantin Tschuertz; Eric Bodden; Christian Rossow<br class="">- WYSISNWIV: What You Scan Is Not What I Visit<br class=""> Qilang Yang; Dimitrios Damopoulos; Georgios Portokalidis<br class="">- SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks<br class=""> Christian Roepke; Thorsten Holz<br class=""><br class="">12:30-14:00<span class="Apple-tab-span" style="white-space: pre;"> </span>Lunch<br class=""><br class="">14:00-15:30 Session 6: Android<br class="">- AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware<br class=""> Wenbo Yang; Juanru Li; Bodong Li; Junliang Shu; Wenjun Hu; Yuanyuan Zhang; Dawu Gu<br class="">- Dissecting and Detecting Android Ransomware<br class=""> Federico Maggi; Nicolo Andronio; Stefano Zanero<br class="">- Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users<br class=""> Rahul Murmuria; Angelos Stavrou; Daniel Barbara; Dan Fleck<br class=""><br class="">15:30-16:00 Coffee<br class=""><br class="">16:00-17:00 Session 7: Privacy<br class="">- Privacy Risk Assessment on Online Photos<br class=""> Haitao Xu; Haining Wang; Angelos Stavrou<br class="">- Privacy is Not an Option: Attacking the IPv6 Privacy Extension<br class=""> Johanna Ullrich; Edgar Weippl; Johanna Ullrich<br class=""><br class="">17:00-18:30 Poster Session<br class=""><br class="">19:00-21:30<span class="Apple-tab-span" style="white-space: pre;"> </span>Reception<br class=""><br class=""><br class="">Wednesday, November 4, 2015<br class="">------------------------<br class="">08:30-09:00 Registration<br class=""><br class="">09:00-11:00 Session 8: Evaluating Solutions<br class="">- Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection<br class=""> Aleksandar Milenkoski; Bryan D. Payne; Nuno Antunes; Marco Vieira; Samuel Kounev; Alberto Avritzer; Matthias Luft<br class="">- Security Analysis of PHP Bytecode Protection Mechanisms<br class=""> Dario Weisser; Johannes Dahse; Thorsten Holz<br class="">- Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks<br class=""> Mohamed Elsabagh; Daniel Barbara; Daniel Fleck; Angelos Stavrou<br class="">- Towards Automatic Inference of Kernel Object Semantics from Binary Code<br class=""> Junyuan Zeng; Zhiqiang Lin<br class=""><br class="">11:00-11:30 Coffee Break<br class=""><br class="">11:30-13:00 Session 9: Attack Detection 2<br class="">- BotWatcher: Transparent and Generic Botnet Tracking<br class=""> Thomas Barabosch; Adrian Dombeck; Khaled Yakdan; Elmar Gerhards-Padilla<br class="">- Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting<br class=""> Yangyi Chen; Vincent Bindschaedler; Xiaofeng Wang; Stefan Berger; Dimitrios Pendarakis<br class="">- AmpPot: Monitoring and Defending Amplification DDoS Attacks<br class=""> Lukas Kraemer; Johannes Krupp; Daisuke Makita; Tomomi Nishizoe; Takashi Koide; Katsunari Yoshioka; Christian Rossow<br class=""><br class="">13:00-13:15 Closing<br class=""><br class="">Thursday, November 5, 2015<br class="">------------------------<br class="">Workshop: BADGERS 2015 (<a href="http://www.necoma-project.eu/badgers-2015/" class="">http://www.necoma-project.eu/badgers-2015/</a>)<br class=""><br class=""><br class=""><MORE INFORMATION><br class="">Additional information about the symposium can be found at:<br class=""><a href="http://www.raid2015.org/" class="">http://www.raid2015.org/</a></body></html>