[crypto] [corrado_leita at symantec.com: [RAID 2009] Conference program]

R. Hirschfeld ray at unipay.nl
Fri Jul 10 08:05:34 CEST 2009


------- Start of forwarded message -------
From: Corrado Leita <corrado_leita at symantec.com>
Subject: [RAID 2009] Conference program
Date: 9 Jul 2009 18:06:56 +0100

===========================================================

                       RAID 2009

            12th International Symposium on
         Recent Advances in Intrusion Detection

                 September 23-25, 2009
              Saint-Malo, Brittany, France
         http://www.rennes.supelec.fr/RAID2009/

     EARLY BIRD REGISTRATION CLOSES:  August 1, 2009

===========================================================

For the twelfth year, the intrusion detection community will
converge at RAID to discuss cutting-edge research in rootkit and
malware detection, collaborative and high performance intrusion
detection, evasion, anomaly detection, and network traffic
analysis. You are invited to join us at RAID for three days
this September in the beautiful Saint-Malo in the French Brittany.

Register online at: http://www.rennes.supelec.fr/RAID2009/

Act quickly! Early-bird registration closes August 1. 

The annual symposium brings together leading researchers and
practitioners from academia, government, and industry to discuss
issues and technologies related to intrusion detection and
defense. 

Don't miss out! Remember:

     EARLY BIRD REGISTRATION CLOSES:  August 1, 2009

- -------------------------------------------------------------------

Wednesday 23rd

12h30 - 14h00: Registration

14h00 - Opening

14h30 - 15h30: Invited talk: Luis Corron (Panda Security)

15h30 - 16h00: Coffee break

16h00 - 18h00: Anomaly and Specification-Based Approaches

Damiano Bolzoni, Sandro Etalle and Pieter Hartel. Panacea: Automating  
Attack Classification for Anomaly-based Network Intrusion Detection  
Systems

Federico Maggi, William Robertson, Christopher Kruegel and Giovanni  
Vigna. Protecting a Moving Target: Addressing Web Application Concept  
Drift

Gabriela Cretu-Ciocarlie, Angelos Stavrou, Michael Locasto and  
Salvatore Stolfo. Adaptive Anomaly Detection via Self-Calibration and  
Dynamic Updating

Martin Rehak, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin  
Grill, Jan Stiborek and Karel Bartos. Runtime Monitoring and Dynamic  
Reconfiguration for Intrusion Detection Systems

18h00-20h00: Poster session
Thursday 24th

9h00 - 10h30: Malware Detection and Prevention (I)

régoire Jacob, Hervé Debar and Eric Filiol. Malware Behavioral  
Detection by Attribute-Automata using Abstraction from Platform and  
Language

cott Schneider, Kent Griffin, Tzi-cker Chiueh and Xin Hu. Automatic  
Generation of String Signatures for Malware Detection

M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, and Muddassar  
Farooq. PE-miner: Mining Structural Information to Detect Malicious  
Executables in Real-Time

10h30 - 11h00: Coffee break

11h00 - 12h30: Network and Host Intrusion Detection and Prevention

Peng Li, Debin Gao and Mike Reiter. Automatically Adapting a Trained  
Anomaly Detector to Software Patches

Juan Caballero, Zhenkai Liang, Pongsin Poosankam and Dawn Song.  
Towards Generating High Coverage Vulnerability-based Signatures with  
Protocol-level Constraint-guided Exploration

Jérome François, Humberto Abdelnur, Radu State and Olivier Festor.  
Automated Behavioral Fingerprinting

12h30 - 14h00: Lunch

14h00 - 15h30: Intrusion Detection for Mobile Devices

Guanhua Yan, Stephan Eidenbenz and Emanuele Galli. SMS-Watchdog:  
Profiling Social Behaviors of SMS Users for Anomaly Detection

Saira Zahid, Muhammad Shahzad, Syed Ali Khayam and Muddassar Farooq.  
Keystroke-based User Identification on Smart Phones

Lei Liu, Guanhua Yan, Xinwen Zhang and Songqing Chen. VirusMeter:  
Preventing Your Cellphone from Spies

15h30 - 16h00: Coffee break

16h00 - 17h00: Invited talk : Roy Maxion (CMU)

17h00: Departure for the Mount Saint Michael (visit of the abbey and  
conference diner)
Friday 25th

9h00 - 10h00: High-performance Intrusion Detection

Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos,  
Evangelos Markatos and Sotiris Ioannidis. Regular Expression Matching  
on Graphics Hardware for Intrusion Detection

Daniel Luchaup, Randy Smith, Cristian Estan and Somesh Jha. Multi-Byte  
Regular Expression Matching with Speculation

10h00 - 10h30: Coffee break

10h30 - 11h30: Malware Detection and Prevention (II)

Chaoting Xuan, John Copeland and Raheem Beyah. Toward Revealing Kernel  
Malware Behavior in Virtual Execution Environments

Jaideep Chandrashekar, Frederic Giroire, Nina Taft, Eve Schooler and  
Dina Papagiannaki. Exploiting Temporal Persistence to Detect Covert  
Botnet Channels

11h30: Concluding remarks

12h00 - 13h30: Lunch
------- End of forwarded message -------


More information about the crypto mailing list