posted by user: xgeorgio || 5295 views || tracked by 8 users: [display]

MALWARE 2011 : 6th International Conference on Malicious and Unwanted Software


When Oct 18, 2011 - Oct 19, 2011
Where Fajardo, USA
Submission Deadline Aug 15, 2011
Notification Due Sep 3, 2011
Final Version Due Sep 17, 2011
Categories    software   security

Call For Papers

The 6th International Conference on Malicious and Unwanted Software (Malware 2011) to be held at Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

On February 15, 2010 Associated Press reported that the number of cell phones in the world reached a new peak of 4.6 billion devices. In the US, 28% of all devices are Smartphone, whose penetration is increasing at a rate of 55.4% according to an IDC report. It is indisputable that the new platform for computation & communication is the Smartphone. At the same time, all of these devices require backend Data Base intensive application, and hence, Cloud Computing has become the de-facto paradigm for communication and computing in the 21st Century. The implications to the Security Industry are dramatic. The old paradigm of securing the network is quickly being replaced by the new paradigm of “Securing the Cloud”. At the same time, the archaic idea of a single attacker, or a single infection vector is quickly being replace by that of distributed attacks launched from botnets. Imagine a world where 4.6 Billion devices are part of a malicious botnet, how do we protect the cloud?, how do we protect the devices?

The implications of this new paradigm for researchers and practitioners in the Anti-Malware industry are dramatic. Securing the perimeter, and providing a controlled software environment are no longer a choice. How can you secure a perimeter when there is none? How can you secure the computing platform when the device, a Smarphone, is owned by the consumer, managed by the consumer, and monitored by the consumer. This year’s conference will pay particular attention to (and will also be extensively discussed in the panel sessions) the challenges of “Malware and Cloud Computing” from both the attackers and the defender's point of view. Authors are encouraged to submit manuscripts that deal with these crucial topics for the 21st Century..

Secondly, the development of the Smart Grid has become a major global priority that promises lower costs, environmental benefits, and societal benefits. However, in a drive for deployment, as it is often the case with new technologies, the issues of security and protection have often been ignored.

Thirdly, organized criminal networks continue to deploy botnets at a rapid pace. As in previous conference, manuscripts that analyze and identify mechanisms to take down such botnets are of high interest to our attendees. Thus, the organizers of Malware 2011 solicit original written contributions addressing these issues and research questions. Manuscripts focusing on the security properties of Cloud Computing, the risks associated with the deployment of such networks, and the analysis of real incidents where a breach has occurred will be particularly welcomed.

Related Resources

ICSE 2021   43rd International Conference on Software Engineering, 23-29 May 2021
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CyberSA 2020   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
ISSRE 2020   The 31st International Symposium on Software Reliability Engineering
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
MAAIDL 2020   Springer Book 'Malware Analysis using Artificial Intelligence and Deep Learning'
ICSIE--ACM, Ei Compendex, Scopus 2020   2020 9th International Conference on Software and Information Engineering (ICSIE 2020)--ACM, Ei Compendex, Scopus
SIGSAC ACM CCS 2020   ACM Conference on Computer and Communications Security (CCS)
ACM--ESSE--Ei Compendex, Scopus 2020   ACM--2020 European Symposium on Software Engineerings (ESSE 2020)--Ei Compendex, Scopus
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things