posted by user: aaron_visaggio || 2459 views || tracked by 3 users: [display]

WMA 2016 : The First International Workshop on Malware Analysis

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/workshopsares2016/wma-2016/
 
When Aug 31, 2016 - Sep 2, 2016
Where Salzburg, Austria
Submission Deadline Apr 4, 2016
Notification Due May 30, 2016
Final Version Due Jun 20, 2016
Categories    malware analysis   smartphone malware   rootkit   targeted attacks
 

Call For Papers

To be held in conjunction with the 11th International Conference on Availability, Reliability and Security (ARES 2016 – http://www.ares-conference.eu).

August 31 – September 2, 2016
Salzburg, Austria

The volume and technical sophistication of malware are constantly increasing. Malware writers have recently developed advanced techniques to evade detection and attack strategies that increase the potential harm caused by malware. The large number and types of devices that can be affected by malware makes the malware detection problem of vital interest to a wide spectrum of computer users. Moreover, recent studies demonstrate that the evolutionary pace of evasion techniques has been much faster than that of anti-malware. This scenario makes urgent the development of a new generation of effective solutions for detecting and removing malware. For these reasons, MWA aims to bring together experts from academia, industry, government, and law enforcement who are interested in advancing the state of the art in malware analysis by exchanging their knowledge, results, ideas, and experiences. The goal of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas, with a sound academic backing. The focus of this workshop is not restricted to techniques for malware detection, but also includes discussion of new models of malware and guidelines for limiting malware diffusion that can be utilized by governments, industries, and other organizations to defend against cyber attacks.
Topics of interest include, but are not limited to:

• Theoretical aspects and new directions in Broad Spectrum Malware related research
• Novel malware detection techniques
• Targeted Attacks
• Smartphone Malware
• Analysis and measurements of real malware incidents
• Worms, viruses and other propagating Malware
• Spyware, keystroke loggers, information theft Malware
• Honeypots and other sample collection methodologies
• Botnet attacks, detection/tracking and defense
• Malware economics and black market studies
• Code reverse engineering tools and practices
• Malware performance, analysis and capture tools
• Anti-spam and anti-phishing techniques and practices
• Malware for SCADA Systems
• Malware and its impact in social networking and cloud computing
• Rootkit and virtualization techniques
• Malware in wireless mobile devices

Best papers will be selected for publication in a Special Issue of the Journal in Computer Virology and Hacking Techniques, published by Springer Verlag.

Related Resources

DIMVA 2025   22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (cycle 2)
SI - AI&Cyber - Applied Sciences (MDPI) 2025   Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
dimva 2025   Conference on Detection of Intrusions and Malware & Vulnerability Assessment
SC 2025   The International Conference for High Performance Computing, Networking, Storage, and Analysis
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
HICSS 2026   Hawaii International Conference on System Sciences Mini Track: AI-Driven Program Analysis and Software Synthesis: Transforming Modern Software Engineering
ICPAMI 2025   2025 2nd International Conference on Pattern Analysis and Machine Intelligence
IEEE SmartIoT 2025   The 9th IEEE International Conference on Smart Internet of Things (SmartIoT 2025)
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
SUMAC 2025   The 7th ACM international workshop on analysis, understanding and promotion of heritage contents