The 13th International Conference on Malicious and Unwanted Software (MALCON 2018) will be held at the Nantucket Hotel & Resort, Nantucket, Massachusetts, USA. The Focus of the conference this year is twofold - (1) Future vulnerabilities and attacks, and (2) secure system implementation and design.
The topics are described in the paragraphs below. Future vulnerabilities and attacks The dark economy now relies on the Internet. This division of labor in the Malware Ecosystem has accelerated the deployment of new threats which often are deployed by multiple entities across platforms (often sloppily), but which certainly meet the business objectives. The underground economy relies on computing infrastructure. Crypto-currencies are starting to replace cash as the preferred specie for remuneration. This specie can even be generated by malicious web activity. As Internet of Things devices rapidly gain online presence, they also become an attractive target for malware. Lack of important security features of Internet enabled devices with questionable provenance invite new types of malware and eventually result in a large scale compromise. Vulnerable networks of IoT devices are then further leveraged to conduct targeted attacks. Defending such a diverse environment requires new analysis and detection paradigms. Current security approaches are often ineffective, since attackers quickly field test prototype attacks that dodge current defenses. Defenders reverse engineer attacks, craft new defenses, which need to be tested to avoid harming the defender’s clients. This cycle of new threats field tested, followed by the development of new defenses based on the new attacks represents an escalation that the defender industry cannot win. Therefore, the Anti-Malware industry needs to evolve in at least two significant ways. Within this context, the future vulnerabilities and attacks explores the next steps we expect to see in the attacker’s arsenal.
Of particular interest are:
Recent reverse engineering results of complex malware,
Analysis of infection spread patterns,
Advanced persistent threat (APT) designs,
Botnet innovations, including domain name generation tools,
Offensive use of BGP and DNS (along with defense innovations),
Return oriented programming,
Attacks with novel use of hardware/firmware,
New forms of phishing analysis and training to conter social engineering,
Online contraband networks,
Malware use of darknet Identity theft,
Malware obfuscation and encryption methods,
Malicious network communications,
Point-of-Sale malware,
Hardware assisted malware detection
10月22日
2018
10月24日
2018
初稿截稿日期
注册截止日期
留言