lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20110830183339.CC9C51902F8@smtp.cs.tamu.edu>
Date: Tue, 30 Aug 2011 13:33:39 -0500 (CDT)
From: Guofei Gu<smart.gophy@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: RAID 2011 (Sep. 20-21, Menlo Park,
	CA) - Final Call for Participation

Call for Participation

14th International Symposium on Recent Advances in Intrusion Detection (RAID'2011)

September 20-21, 2011
SRI International, Menlo Park, CA
http://www.raid2011.org

Register online now! http://www.raid2011.org/

===========================================================
About the conference:

For the fourteenth year, the intrusion detection community will 
converge at RAID'2011 to discuss cutting-edge research in malware, 
application security, anomaly detection, special environments 
and sandboxing, web security and social networks, and network  
security. You are invited to join us at RAID for two days 
this September at SRI International, Menlo Park, CA.

The annual symposium brings together leading researchers and 
practitioners from academia, government, and industry to discuss 
issues and technologies related to intrusion detection and 
defense. 

RAID 2011 features an exciting technical program, with 
presentations addressing topics such as dynamic analysis of malicious
shellcode, world's fastest taint tracker, anomaly detection using 
software defined networking, defending legacy embeded systems, 
web and social network security, and cross-analysis of botnet victims.
A poster session during the symposium will provide lively 
face-to-face discussions of work in progress.

===========================================================
Program this year:

******Tuesday September 20th******

8:45 �� 9:45
Keynote: Kevin Fu
The Cutting Edge of Medical Device Security and Privacy

10:00 �� 12:00
Session 1 (Malware)
Chair: Guofei Gu

10:00 �� 10:30
Shellzer: a tool for the dynamic analysis of malicious shellcode
Yanick Fratantonio (Politecnico di Milano), Christopher Kruegel and Giovanni Vigna (University of California, Santa Barbara)

10:30 �� 11:00
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware
Stefano Ortolani and Cristiano Giuffrida (Vrije Universiteit) and Bruno Crispo (University of Trento)

11:00 �� 11:30
Packed, Printable, and Polymorphic Return-Oriented Programming
Kangjie Lu and Dabi Zou (Singapore Management University), Weiping Wen (Peking University), and Debin Gao (Singapore Management University)

11:30 �� 12:00
On the Expressiveness of Return-into-libc Attacks
Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, and Peng Ning (North Carolina State University)

12:00 �� 13:30
Lunch

13:30 �� 15:00
Session 2 (Application Security)
Chair: Debin Gao

13:30 �� 14:00
Minemu: The World's Fastest Taint Tracker
Erik Bosman, Asia Slowinska, and Herbert Bos (Vrije Universiteit Amsterdam)

14:00 �� 14:30
Dymo: Tracking Dynamic Code Identity
Bob Gilbert, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna (University of California, Santa Barbara)

14:30 �� 15:00
Automated Identification of Cryptographic Primitives in Binary Programs
Felix Gr��t (Ruhr-University Bochum), Carsten Willems (University of Mannheim), and Thorsten Holz (Ruhr-University Bochum)

15:00 �� 15:30
Health Break

15:30 �� 17:00
Session 3 (Anomaly Detection)
Chair: Mathieu Couture

15:30 �� 16:00
Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
Nathaniel Boggs (Columbia University), Sharath Hiremagalore and Angelos Stavrou (George Mason University), and Salvatore J. Stolfo (Columbia University)

16:00 �� 16:30
Revisiting Traffic Anomaly Detection using Software Defined Networking
Syed Akbar Mehdi, Junaid Khalid, and Syed Ali Khayam (National University of Sciences and Technology, Pakistan)

16:30 �� 17:00
Modeling User Search Behavior for Masquerade Detection
Malek Ben Salem and Salvatore J. Stolfo (Columbia University)

17:00 �� 19:00
Poster Session (lobby)

19:30
Banquet at Oak City Restaurant (walk from conference)


******Wednesday September 21st******

8:00 - 8:30
Continental Breakfast

8:30 �� 10:00
Session 4 (Special Environments and Sandboxing)
Chair: Angelos Stavrou

8:30 �� 9:00
Defending Legacy Embedded Systems with Software Symbiotes
Ang Cui and Salvatore J. Stolfo (Columbia University)

9:00 �� 9:30
What if you can't trust your network card?
Lo��Duflot, Yves-Alexis Perez, and Benjamin Morin (ANSSI)

9:30 �� 10:00
Detecting Environment-Sensitive Malware
Martina Lindorfer, Clemens Kolbitsch, and Paolo Milani Comparetti (Vienna University of Technology)

10:00 �� 10:15
Health Break

10:15 �� 11:45
Panel Discussion: State and Future of Open-Source Network Intrusion Detection

11:45 �� 13:15
Lunch

13:15 �� 15:15
Session 5 (Web Security and Social Networks)
Chair: Davide Balzarotti

13:15 �� 13:45
Banksafe - Information Stealer Detection inside the Web Browser
Armin Buescher (G Data Security Labs), Felix Leder (University of Bonn), and Thomas Siebert (G Data Security Labs)

13:45 �� 14:15
IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM
Mario Heiderich, Tilman Frosch, and Thorsten Holz (Ruhr-University Bochum)

14:15 �� 14:45
Spam Filtering in Twitter using Sender-Receiver Relationship
Jonghyuk Song, Sangho Lee, and Jong Kim (POSTECH)

14:45 �� 15:15
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
Chao Yang, Robert Harkreader, and Guofei Gu (Texas A&M University)

15:15 �� 15:30
Health Break

15:30 �� 17:00
Session 6 (Network Security)
Chair: Phil Porras

15:30 �� 16:00
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
Sheila Becker (University of Luxembourg), Jeff Seibert and Cristina Nita-Rotaru (Purdue University), and Radu State (University of Luxembourg)

16:00 �� 16:30
Detecting Traffic Snooping in Tor Using Decoys
Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis (Columbia University)

16:30 �� 17:00
Cross-Analysis of Botnet Victims: New Insights and Implications
Seungwon Shin, Raymond Lin, and Guofei Gu (Texas A&M University) 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ