活动简介

The 13th International Conference on Malicious and Unwanted Software (MALCON 2018) will be held at the Nantucket Hotel & Resort, Nantucket, Massachusetts, USA. The Focus of the conference this year is twofold - (1) Future vulnerabilities and attacks, and (2) secure system implementation and design.

征稿信息

重要日期

2018-07-17
初稿截稿日期

The topics are described in the paragraphs below. Future vulnerabilities and attacks The dark economy now relies on the Internet. This division of labor in the Malware Ecosystem has accelerated the deployment of new threats which often are deployed by multiple entities across platforms (often sloppily), but which certainly meet the business objectives. The underground economy relies on computing infrastructure. Crypto-currencies are starting to replace cash as the preferred specie for remuneration. This specie can even be generated by malicious web activity. As Internet of Things devices rapidly gain online presence, they also become an attractive target for malware. Lack of important security features of Internet enabled devices with questionable provenance invite new types of malware and eventually result in a large scale compromise. Vulnerable networks of IoT devices are then further leveraged to conduct targeted attacks. Defending such a diverse environment requires new analysis and detection paradigms. Current security approaches are often ineffective, since attackers quickly field test prototype attacks that dodge current defenses. Defenders reverse engineer attacks, craft new defenses, which need to be tested to avoid harming the defender’s clients. This cycle of new threats field tested, followed by the development of new defenses based on the new attacks represents an escalation that the defender industry cannot win. Therefore, the Anti-Malware industry needs to evolve in at least two significant ways. Within this context, the future vulnerabilities and attacks explores the next steps we expect to see in the attacker’s arsenal.

征稿范围

Of particular interest are:
Recent reverse engineering results of complex malware,
Analysis of infection spread patterns,
Advanced persistent threat (APT) designs,
Botnet innovations, including domain name generation tools,
Offensive use of BGP and DNS (along with defense innovations),
Return oriented programming,
Attacks with novel use of hardware/firmware,
New forms of phishing analysis and training to conter social engineering,
Online contraband networks,
Malware use of darknet Identity theft,
Malware obfuscation and encryption methods,
Malicious network communications,
Point-of-Sale malware,
Hardware assisted malware detection

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月22日

    2018

    10月24日

    2018

  • 07月17日 2018

    初稿截稿日期

  • 10月24日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询