[Oisf-devel] RAID 2015 Call for Participation
Giorgos Vasiliadis
gvasil at ics.forth.gr
Thu Oct 15 14:42:08 UTC 2015
******************************************************************************
The 18th International Symposium on Research in Attacks, Intrusions and
Defenses (RAID2015)
Kyoto, Japan -- November 2-5, 2015
http://www.raid2015.org/ <http://www.raid2015.org/>
******************************************************************************
** Program now available! **
<ABOUT THE CONFERENCE>
The 18th International Symposium on Research in Attacks, Intrusions
and Defenses, previously known as Recent Advances in Intrusion
Detection, will be held in Kyoto, Japan. This symposium brings
together leading researchers and practitioners from academia,
government, and industry to discuss novel security problems, solutions
and technologies related to intrusion detection, attacks and defenses.
The RAID Symposium 2015 is organized as a 4-day event featuring:
- 28 scientific paper presentation in 3 days (November 2-4)
- 1 co-located workshop (November 5)
- 2 social events
<VENUE>
"Kyoto Terrsa"
Address: Shimotonoda-cho Higashi-Kujo, Minami-ku, Kyoto, Japan
http://www.raid2015.org/venue.html <http://www.raid2015.org/venue.html>
<COMMITTEES>
General Chair: Youki Kadobayashi (NAIST)
PC Chair: Herbert Bos (Vrije Universiteit/VU University Amsterdam)
PC Co-Chair: Fabian Monrose (University of North Carolina at Chapel Hill)
<REGISTRATION>
Registration information is available at:
http://www.raid2015.org/registration.html <http://www.raid2015.org/registration.html>
Early registration fees apply until October 1, 2015.
<HOTEL>
We reserved 100 rooms in Kyoto city during the RAID symposium.
The reservation procedures and details are available on the following page.
http://www.raid2015.org/hotel.html <http://www.raid2015.org/hotel.html>
Even if you do not need a reservation for the listed hotels, we
strongly recommend that you make a hotel reservation as early as
possible, as November is the tourist season in Kyoto and you may have
difficulty finding hotels at the last minute.
<PROGRAM>
Monday, November 2, 2015
------------------------
08:30-09:00 Registration
09:00-09:15 Opening
09:15-10:15 Keynote: Mark Seaborn, Google
10:15-10:30 Coffee Break
10:30-12:30 Session 1: Cool Stuff You Can Do with Hardware
- Ensemble Learning for Low-level Hardware-supported Malware Detection
Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev
- Physical-layer Detection of Hardware Keyloggers
Ryan M. Gerdes; Saptarshi Mallick
- Reverse Engineering Intel Complex Addressing Using Performance Counters
Clementine Maurice; Nicolas Le Scouarnec; Christoph Neumann; Olivier Heen; Aurelien Francillon
- Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
Pinghai Yuan; Xuhua Ding; Qingkai Zeng
12:30-14:00 Lunch
14:00-15:30 Session 2: Networks
- Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors
Jaehyun Nam; Muhammad Jamshed; Byungkwon Choi; Dongsu Han; KyoungSoo Park
- Demystifying the IP Blackspace
Quentin Jacquemart; Pierre-Antoine Vervier; Guillaume Urvoy-Keller; Ernst Biersack
- Providing Dynamic Control to Passive Network Security Monitoring
Johanna Amann; Robin Sommer
15:30-16:00 Coffee Break
16:00-17:30 Session 3: Hardening
- Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
Weixuan Mao; Zhongmin Cai; Xiaohong Guan; Don Towsley
- Counteracting Data-Only Malware with Code Pointer Examination
Thomas Kittel; Sebastian Vogl; Julian Kirsch; Claudia Eckert
- Xede: Practical Exploit Early Detection
Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng
19:00-21:00 Banquet
Tuesday, November 3, 2015
------------------------
08:30-09:00 Registration
09:00-10:30 Session 4: Attack Detection 1
- Preventing Exploits in Microsoft Office Documents through Content Randomization
Charles Smutz; Angelos Stavrou
- Improving accuracy of static integer overflow detection in binary
Yang Zhang; Xiaoshan Sun; Yi Deng; Liang Cheng; Shuke Zeng; Yu Fu; Dengguo Feng
- A Formal Framework for Program Anomaly Detection
Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder
10:30-11:00 Coffee Break
11:00-12:30 Session 5: Web and Net
- jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Giancarlo Pellegrino; Constantin Tschuertz; Eric Bodden; Christian Rossow
- WYSISNWIV: What You Scan Is Not What I Visit
Qilang Yang; Dimitrios Damopoulos; Georgios Portokalidis
- SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks
Christian Roepke; Thorsten Holz
12:30-14:00 Lunch
14:00-15:30 Session 6: Android
- AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
Wenbo Yang; Juanru Li; Bodong Li; Junliang Shu; Wenjun Hu; Yuanyuan Zhang; Dawu Gu
- Dissecting and Detecting Android Ransomware
Federico Maggi; Nicolo Andronio; Stefano Zanero
- Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
Rahul Murmuria; Angelos Stavrou; Daniel Barbara; Dan Fleck
15:30-16:00 Coffee
16:00-17:00 Session 7: Privacy
- Privacy Risk Assessment on Online Photos
Haitao Xu; Haining Wang; Angelos Stavrou
- Privacy is Not an Option: Attacking the IPv6 Privacy Extension
Johanna Ullrich; Edgar Weippl; Johanna Ullrich
17:00-18:30 Poster Session
19:00-21:30 Reception
Wednesday, November 4, 2015
------------------------
08:30-09:00 Registration
09:00-11:00 Session 8: Evaluating Solutions
- Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection
Aleksandar Milenkoski; Bryan D. Payne; Nuno Antunes; Marco Vieira; Samuel Kounev; Alberto Avritzer; Matthias Luft
- Security Analysis of PHP Bytecode Protection Mechanisms
Dario Weisser; Johannes Dahse; Thorsten Holz
- Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks
Mohamed Elsabagh; Daniel Barbara; Daniel Fleck; Angelos Stavrou
- Towards Automatic Inference of Kernel Object Semantics from Binary Code
Junyuan Zeng; Zhiqiang Lin
11:00-11:30 Coffee Break
11:30-13:00 Session 9: Attack Detection 2
- BotWatcher: Transparent and Generic Botnet Tracking
Thomas Barabosch; Adrian Dombeck; Khaled Yakdan; Elmar Gerhards-Padilla
- Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting
Yangyi Chen; Vincent Bindschaedler; Xiaofeng Wang; Stefan Berger; Dimitrios Pendarakis
- AmpPot: Monitoring and Defending Amplification DDoS Attacks
Lukas Kraemer; Johannes Krupp; Daisuke Makita; Tomomi Nishizoe; Takashi Koide; Katsunari Yoshioka; Christian Rossow
13:00-13:15 Closing
Thursday, November 5, 2015
------------------------
Workshop: BADGERS 2015 (http://www.necoma-project.eu/badgers-2015/ <http://www.necoma-project.eu/badgers-2015/>)
<MORE INFORMATION>
Additional information about the symposium can be found at:
http://www.raid2015.org/ <http://www.raid2015.org/>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-devel/attachments/20151015/4a06efb2/attachment.html>
More information about the Oisf-devel
mailing list