[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTindqarVc0y199xsPG75dyuuLIZeHJVmF3qPYSbh@mail.gmail.com>
Date: Thu, 8 Jul 2010 10:15:24 +0200
From: Daniel Reynaud <reynaudd@...ia.fr>
To: full-disclosure@...ts.grok.org.uk
Subject: Malware 2010 CfP *** Extended Deadline
Apologies for multiple postings
----------------------------------------------------------------------
*** Malware 2010 Call for Papers ***
http://malware10.loria.fr/
----------------------------------------------------------------------
Important dates
----------------------------------------------------------------------
Extended Deadline: July 17, 2010 23:59:59 EST
Notification of Acceptance: August 27th, 2010, 23:59:59 EST
Camera ready paper: September 10th, 2010: 23:59:59 EST
Workshop dates: October 20-21, 2010
----------------------------------------------------------------------
Overview
----------------------------------------------------------------------
The 5th IEEE International Conference on Malicious and Unwanted
Software (Malware 2010) will be held in Nancy, France, Oct. 20-21,
2010. The conference is designed to bring together experts from
industry, academia, and government to present and discuss, in an open
environment, the latest advances and discoveries in the field of
malicious and unwanted software. Techniques, economics and legal
issues surrounding the topic of Malware, and the methods to detect and
control them will be discussed.
This year's conference will pay particular attention to (and will also
be extensively discussed in a panel session) the pressing topic of
"Malware and Cloud Computing". As low-cost netbooks become popular,
Google's Chrome OS enters the mainstream, and social networks
(Facebook, YouTube, Twitter, LinkedIn, and so forth) become
ubiquitous, the security dangers associated with the new computing
paradigm increase exponentially. In effect, "Cloud Computing",
Multi-tenant, Single Schema, Single Server Platforms (C2S3P) increase
vulnerabilities by providing a single point of failure and attack for
organized criminal networks. Critical/sensitive/private information is
at risk, and very much like previous technology adoption trends, such
as wireless networks, the dash for success is trumping the need for
security.
Thus, the organizers of Malware 2010 solicit original written
contributions addressing these issues and research questions.
Manuscripts focusing on the security properties of Cloud Computing,
the risks associated with the deployment of such networks, and the
analysis of real incidents where a breach has occurred will be
particularly welcomed.
----------------------------------------------------------------------
Submissions are solicited in, but not limited to, the following areas
----------------------------------------------------------------------
Theoretical aspects and new directions on Malware related research
Analysis and measurements of real malware incidents
Worms, viruses and other propagating Malware
Spyware, keystroke loggers, information theft Malware
Honeypots and other sample collection methodologies
Botnet attacks, detection/tracking and defense
Malware economics and black market studies
Code reverse engineering tools and practices
Malware performance, analysis and capture tools
Anti-spam and anti-phishing techniques and practices
Legal aspects of unwanted software use
Malware and its impact in social networking and cloud computing
Rootkit and virtualization techniques
Malware in wireless mobile devices
----------------------------------------------------------------------
Publication
----------------------------------------------------------------------
The proceedings of the conference will be published in printed, and
DVD, form and will be included in the IEEE Xplore digital library. In
addition, the Conference's Technical Program Committee will select one
manuscript as a recipient of the "Best Paper Award". The Best Paper
Award author, together with the authors of a few selected manuscripts
from the conference, will be invited to submit an extended version to
a special issue of the Journal.
----------------------------------------------------------------------
Paper Submission Information
----------------------------------------------------------------------
Papers should be submitted through EDAS system at:
http://www.edas.info/
Submitted manuscripts must be 10-point font size, and should not
exceed 8 single-spaced pages in length, including the abstract,
figures, and references. Authors whose manuscript exceeds the 8 page
limit may be allowed to include two additional pages for an extra
charge. However, under no circumstances shall a submitted manuscript
exceed the 10 page limit. Submitted papers must not substantially
overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with
proceedings.
----------------------------------------------------------------------
Additional Information
----------------------------------------------------------------------
For more information on Malware 2010 or if you are interested in
contributing to the organization of the conference please contact
Dr. Fernando C. Colon Osorio, General Program Chair, Malware 2010 at
fcco@...ndeis.edu or visit our web site www.malware2010.org. For
information concerning submission of an original manuscript to the
conference, please contact the Technical Program Committee Chairs
(TPC).
----------------------------------------------------------------------
Chairs of Malware 2010
----------------------------------------------------------------------
Jean-Yves Marion, Nancy University, France, TPC
Noam Rathaus, Beyond Security, USA, TPC
Cliff Zhou, University Central Florida, USA, TPC
----------------------------------------------------------------------
PC members
----------------------------------------------------------------------
Anthony Arrott, Trends Micro, USA
Pierre-Marc Bureau, ESET, Canada
Mila Dalla Preda, Verona University, Italy
Saumya Debray, Arizona University, USA
Thomas Engel, University of Luxembourg, Luxembourg
Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada
Olivier Festor, INRIA Nancy Grand-Est, France
Brent Kang, North Carolina University, USA
Felix Leder, Bonn University, Germany
Bo Olsen, Kaspersky, USA
Jose Nazario, Arbor networks, USA
Phil Porras, SRI International, USA
Fred Raynal, Sogeti, France
Andrew Walenstein, Lafayette University, USA
Jeff Williams, Microsoft, USA
Yang Xiang, Deakin University, Australia
----------------------------------------------------------------------
Publicity chair: Daniel Reynaud, Nancy University - Loria, France
Local chair: Matthieu Kaczmarek, INRIA Nancy Grand-Est, France
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists