|
Wednesday, August 10, 2005
|
8:30am-8:45am |
Opening Remarks |
8:45am-10:15am |
[Session 1: Static Analysis]
-
Bart Miller, University of Wisconsin, A
Framework for Binary Code Analysis, and Static
and Dynamic Patching
-
Giovanni Vigna, University of California,
Santa Barbara, Detecting Malicious
Software using Binary Analysis
-
Tom Reps, University of Wisconsin, A
Next-Generation Platform for Analyzing
Executables
|
10:15am-10:30am |
[BREAK]
|
10:30am-12:00 pm |
[Session 2: Worms]
-
Nick Weaver, International Computer Science
Institute, Principles of Worm Defense
-
Dawn Song, Carnegie Mellon University,
Sting: an Automatic Defense System against
Zero-day Worm Attacks
-
Stefan Savage, University of California, San
Diego, Large-scale worm detection
|
12:00pm-1:30pm |
[LUNCH, provided]
-
Jonathon Giffin and Vinod Yegneswaran, University of
Wisconsin, Madison, Demo
|
1:30pm-3:00pm |
[Session 3: Novel Techniques for
Constructing Trustworthy Services]
-
Adrian Perrig, Carnegie Mellon University,
The Use of Software-based Attestation to
Detect Malware on Legacy Platforms
-
Mike Reiter, Carnegie Mellon University,
Survivable systems via distributed
trust
-
Geoffrey Smith, Florida International
University, Research Directions in Secure
Information-Flow Analysis
|
3:00pm-3:15pm |
[BREAK]
|
3:15pm-4:45pm |
[Session 4: Emerging Topics]
-
Paul Barford, University of Wisconsin,
Madison, An Inside Look at Botnets
-
Wenke Lee, Georgia Tech, Countering the
Attack Networks
-
Mihai Christodorescu, University of Wisconsin,
Madison, Improved Defenses through
Cooperation of Network-based and Host-based
Malware Detectors
|
Thursday August, 11, 2005
|
9:00am-10:30am |
[Session 5: Malware Detection/Defense]
-
Angelos Keromytis, Columbia University,
Shadow Honeypots and Unsupervised Anomaly
Detection Training
-
Sal Stolfo, Columbia University, Applying
"Fileprints" to Detect Malware
-
Carey Nachenberg and Brian Witten, Symantec
AntiVirus Research Center, Neutralizing
Rapidly-propagating Unknown Malware: A Survey
of Symantec's Research Effort
Slides: not available.
|
10:30am-10:45am |
[BREAK]
|
10:45am-12:15pm |
[Session 6: Static Analysis II]
-
Chris Kruegel, Technical University, Vienna,
Characterizing the Behavior and Structure
of Malicious Executables
-
Michael Colón, Naval Research Lab, Program
Analysis for Malicious Code Detection
-
Alex Orso, Georgia Tech, Combining Static
Analysis and Runtime Monitoring to Counter
SQL-Injection Attacks
|
12:15pm-1:30pm |
[LUNCH, provided]
|
1:30pm-3:00pm |
[Research Roadmap Discussion]
|
|