[Oisf-devel] RAID 2015 Call for Participation

Giorgos Vasiliadis gvasil at ics.forth.gr
Thu Oct 15 14:42:08 UTC 2015


******************************************************************************
The 18th International Symposium on Research in Attacks, Intrusions and
Defenses (RAID2015)
Kyoto, Japan -- November 2-5, 2015
http://www.raid2015.org/ <http://www.raid2015.org/>
******************************************************************************

** Program now available! **

<ABOUT THE CONFERENCE>
The 18th International Symposium on Research in Attacks, Intrusions
and Defenses, previously known as Recent Advances in Intrusion
Detection, will be held in Kyoto, Japan.  This symposium brings
together leading researchers and practitioners from academia,
government, and industry to discuss novel security problems, solutions
and technologies related to intrusion detection, attacks and defenses.

The RAID Symposium 2015 is organized as a 4-day event featuring:
- 28 scientific paper presentation in 3 days (November 2-4)
- 1 co-located workshop (November 5)
- 2 social events


<VENUE>
"Kyoto Terrsa"
Address: Shimotonoda-cho Higashi-Kujo, Minami-ku, Kyoto, Japan
http://www.raid2015.org/venue.html <http://www.raid2015.org/venue.html>


<COMMITTEES>
General Chair: Youki Kadobayashi (NAIST)
PC Chair:      Herbert Bos (Vrije Universiteit/VU University Amsterdam)
PC Co-Chair:   Fabian Monrose (University of North Carolina at Chapel Hill)


<REGISTRATION>
Registration information is available at:
http://www.raid2015.org/registration.html <http://www.raid2015.org/registration.html>

Early registration fees apply until October 1, 2015.


<HOTEL>
We reserved 100 rooms in Kyoto city during the RAID symposium. 
The reservation procedures and details are available on the following page.
http://www.raid2015.org/hotel.html <http://www.raid2015.org/hotel.html>

Even if you do not need a reservation for the listed hotels, we
strongly recommend that you make a hotel reservation as early as
possible, as November is the tourist season in Kyoto and you may have
difficulty finding hotels at the last minute.


<PROGRAM>
Monday, November 2, 2015 
------------------------
08:30-09:00 Registration

09:00-09:15 Opening 

09:15-10:15 Keynote: Mark Seaborn, Google

10:15-10:30 Coffee Break

10:30-12:30 Session 1: Cool Stuff You Can Do with Hardware
- Ensemble Learning for Low-level Hardware-supported Malware Detection
 Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev
- Physical-layer Detection of Hardware Keyloggers
 Ryan M. Gerdes; Saptarshi Mallick
- Reverse Engineering Intel Complex Addressing Using Performance Counters
 Clementine Maurice; Nicolas Le Scouarnec; Christoph Neumann; Olivier Heen; Aurelien Francillon
- Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
 Pinghai Yuan; Xuhua Ding; Qingkai Zeng 

12:30-14:00 Lunch

14:00-15:30 Session 2: Networks
- Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors
 Jaehyun Nam; Muhammad Jamshed; Byungkwon Choi; Dongsu Han; KyoungSoo Park
- Demystifying the IP Blackspace
 Quentin Jacquemart; Pierre-Antoine Vervier; Guillaume Urvoy-Keller; Ernst Biersack
- Providing Dynamic Control to Passive Network Security Monitoring
 Johanna Amann; Robin Sommer 

15:30-16:00 Coffee Break

16:00-17:30 Session 3: Hardening
- Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
 Weixuan Mao; Zhongmin Cai; Xiaohong Guan; Don Towsley
- Counteracting Data-Only Malware with Code Pointer Examination
 Thomas Kittel; Sebastian Vogl; Julian Kirsch; Claudia Eckert
- Xede: Practical Exploit Early Detection
 Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng 

19:00-21:00 Banquet


Tuesday, November 3, 2015 
------------------------
08:30-09:00 Registration

09:00-10:30 Session 4: Attack Detection 1 
- Preventing Exploits in Microsoft Office Documents through Content Randomization
 Charles Smutz; Angelos Stavrou
- Improving accuracy of static integer overflow detection in binary
 Yang Zhang; Xiaoshan Sun; Yi Deng; Liang Cheng; Shuke Zeng; Yu Fu; Dengguo Feng
- A Formal Framework for Program Anomaly Detection
 Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder

10:30-11:00 Coffee Break

11:00-12:30 Session 5: Web and Net 
- jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
 Giancarlo Pellegrino; Constantin Tschuertz; Eric Bodden; Christian Rossow
- WYSISNWIV: What You Scan Is Not What I Visit
 Qilang Yang; Dimitrios Damopoulos; Georgios Portokalidis
- SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks
 Christian Roepke; Thorsten Holz

12:30-14:00	Lunch

14:00-15:30 Session 6: Android
- AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
 Wenbo Yang; Juanru Li; Bodong Li; Junliang Shu; Wenjun Hu; Yuanyuan Zhang; Dawu Gu
- Dissecting and Detecting Android Ransomware
 Federico Maggi; Nicolo Andronio; Stefano Zanero
- Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
 Rahul Murmuria; Angelos Stavrou; Daniel Barbara; Dan Fleck

15:30-16:00 Coffee

16:00-17:00 Session 7: Privacy
- Privacy Risk Assessment on Online Photos
 Haitao Xu; Haining Wang; Angelos Stavrou
- Privacy is Not an Option: Attacking the IPv6 Privacy Extension
 Johanna Ullrich; Edgar Weippl; Johanna Ullrich

17:00-18:30 Poster Session

19:00-21:30	Reception


Wednesday, November 4, 2015
------------------------
08:30-09:00 Registration

09:00-11:00 Session 8: Evaluating Solutions
- Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection
 Aleksandar Milenkoski; Bryan D. Payne; Nuno Antunes; Marco Vieira; Samuel Kounev; Alberto Avritzer; Matthias Luft
- Security Analysis of PHP Bytecode Protection Mechanisms
 Dario Weisser; Johannes Dahse; Thorsten Holz
- Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks
 Mohamed Elsabagh; Daniel Barbara; Daniel Fleck; Angelos Stavrou
- Towards Automatic Inference of Kernel Object Semantics from Binary Code
 Junyuan Zeng; Zhiqiang Lin

11:00-11:30 Coffee Break

11:30-13:00 Session 9: Attack Detection 2
- BotWatcher: Transparent and Generic Botnet Tracking
 Thomas Barabosch; Adrian Dombeck; Khaled Yakdan; Elmar Gerhards-Padilla
- Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting
 Yangyi Chen; Vincent Bindschaedler; Xiaofeng Wang; Stefan Berger; Dimitrios Pendarakis
- AmpPot: Monitoring and Defending Amplification DDoS Attacks
 Lukas Kraemer; Johannes Krupp; Daisuke Makita; Tomomi Nishizoe; Takashi Koide; Katsunari Yoshioka; Christian Rossow

13:00-13:15 Closing

Thursday, November 5, 2015
------------------------
Workshop: BADGERS 2015 (http://www.necoma-project.eu/badgers-2015/ <http://www.necoma-project.eu/badgers-2015/>)


<MORE INFORMATION>
Additional information about the symposium can be found at:
http://www.raid2015.org/ <http://www.raid2015.org/>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-devel/attachments/20151015/4a06efb2/attachment.html>


More information about the Oisf-devel mailing list