[crypto] [corrado_leita at symantec.com: [RAID 2009] Conference program]
R. Hirschfeld
ray at unipay.nl
Fri Jul 10 08:05:34 CEST 2009
------- Start of forwarded message -------
From: Corrado Leita <corrado_leita at symantec.com>
Subject: [RAID 2009] Conference program
Date: 9 Jul 2009 18:06:56 +0100
===========================================================
RAID 2009
12th International Symposium on
Recent Advances in Intrusion Detection
September 23-25, 2009
Saint-Malo, Brittany, France
http://www.rennes.supelec.fr/RAID2009/
EARLY BIRD REGISTRATION CLOSES: August 1, 2009
===========================================================
For the twelfth year, the intrusion detection community will
converge at RAID to discuss cutting-edge research in rootkit and
malware detection, collaborative and high performance intrusion
detection, evasion, anomaly detection, and network traffic
analysis. You are invited to join us at RAID for three days
this September in the beautiful Saint-Malo in the French Brittany.
Register online at: http://www.rennes.supelec.fr/RAID2009/
Act quickly! Early-bird registration closes August 1.
The annual symposium brings together leading researchers and
practitioners from academia, government, and industry to discuss
issues and technologies related to intrusion detection and
defense.
Don't miss out! Remember:
EARLY BIRD REGISTRATION CLOSES: August 1, 2009
- -------------------------------------------------------------------
Wednesday 23rd
12h30 - 14h00: Registration
14h00 - Opening
14h30 - 15h30: Invited talk: Luis Corron (Panda Security)
15h30 - 16h00: Coffee break
16h00 - 18h00: Anomaly and Specification-Based Approaches
Damiano Bolzoni, Sandro Etalle and Pieter Hartel. Panacea: Automating
Attack Classification for Anomaly-based Network Intrusion Detection
Systems
Federico Maggi, William Robertson, Christopher Kruegel and Giovanni
Vigna. Protecting a Moving Target: Addressing Web Application Concept
Drift
Gabriela Cretu-Ciocarlie, Angelos Stavrou, Michael Locasto and
Salvatore Stolfo. Adaptive Anomaly Detection via Self-Calibration and
Dynamic Updating
Martin Rehak, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin
Grill, Jan Stiborek and Karel Bartos. Runtime Monitoring and Dynamic
Reconfiguration for Intrusion Detection Systems
18h00-20h00: Poster session
Thursday 24th
9h00 - 10h30: Malware Detection and Prevention (I)
régoire Jacob, Hervé Debar and Eric Filiol. Malware Behavioral
Detection by Attribute-Automata using Abstraction from Platform and
Language
cott Schneider, Kent Griffin, Tzi-cker Chiueh and Xin Hu. Automatic
Generation of String Signatures for Malware Detection
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, and Muddassar
Farooq. PE-miner: Mining Structural Information to Detect Malicious
Executables in Real-Time
10h30 - 11h00: Coffee break
11h00 - 12h30: Network and Host Intrusion Detection and Prevention
Peng Li, Debin Gao and Mike Reiter. Automatically Adapting a Trained
Anomaly Detector to Software Patches
Juan Caballero, Zhenkai Liang, Pongsin Poosankam and Dawn Song.
Towards Generating High Coverage Vulnerability-based Signatures with
Protocol-level Constraint-guided Exploration
Jérome François, Humberto Abdelnur, Radu State and Olivier Festor.
Automated Behavioral Fingerprinting
12h30 - 14h00: Lunch
14h00 - 15h30: Intrusion Detection for Mobile Devices
Guanhua Yan, Stephan Eidenbenz and Emanuele Galli. SMS-Watchdog:
Profiling Social Behaviors of SMS Users for Anomaly Detection
Saira Zahid, Muhammad Shahzad, Syed Ali Khayam and Muddassar Farooq.
Keystroke-based User Identification on Smart Phones
Lei Liu, Guanhua Yan, Xinwen Zhang and Songqing Chen. VirusMeter:
Preventing Your Cellphone from Spies
15h30 - 16h00: Coffee break
16h00 - 17h00: Invited talk : Roy Maxion (CMU)
17h00: Departure for the Mount Saint Michael (visit of the abbey and
conference diner)
Friday 25th
9h00 - 10h00: High-performance Intrusion Detection
Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos,
Evangelos Markatos and Sotiris Ioannidis. Regular Expression Matching
on Graphics Hardware for Intrusion Detection
Daniel Luchaup, Randy Smith, Cristian Estan and Somesh Jha. Multi-Byte
Regular Expression Matching with Speculation
10h00 - 10h30: Coffee break
10h30 - 11h30: Malware Detection and Prevention (II)
Chaoting Xuan, John Copeland and Raheem Beyah. Toward Revealing Kernel
Malware Behavior in Virtual Execution Environments
Jaideep Chandrashekar, Frederic Giroire, Nina Taft, Eve Schooler and
Dina Papagiannaki. Exploiting Temporal Persistence to Detect Covert
Botnet Channels
11h30: Concluding remarks
12h00 - 13h30: Lunch
------- End of forwarded message -------
More information about the crypto
mailing list