exploit the possibilities

ACM-CFP2007.txt

ACM-CFP2007.txt
Posted Jun 20, 2007
Site auto.tuwien.ac.at

The 5th ACM Workshop On Recurring Malcode (WORM) 2007 Call For Papers has been announced. It will be held on November 2, 2007 in Alexandria, VA, USA.

tags | paper, worm, conference
MD5 | 22042d6df89712ab5d890a119d751158

ACM-CFP2007.txt

Change Mirror Download
[ please excuse multiple copies of this message ]

*****************************************************************
Paper submission deadline extended: 24 June 2007 (23:59 PST)
*****************************************************************

=======================================
C A L L F O R P A P E R S
=======================================

The 5th ACM WORKSHOP ON RECURRING MALCODE (WORM) 2007

November 2, 2007 in Alexandria, VA, USA

held in association with the 14th ACM Conference on
Computer and Communications Security (CCS)

http://www.auto.tuwien.ac.at/~chris/worm07.html

=================================================================
Important Dates:

Submission deadline: 24 June, 2007 (23:59 PST)
Acceptance Notification: 07 August, 2007
Camera-ready papers: 22 August, 2007

=================================================================

Internet-wide infectious epidemics have emerged as one of the
leading threats to information security and service availability.
Self-propagating threats, often termed worms, exploit software
weaknesses, hardware limitations, Internet topology, and the open
Internet communication model to compromise large numbers of
networked systems. Malware is increasingly used as a beachhead to
launch further malicious activities, such as installing spyware,
deploying phishing servers and spam relays, or performing
information espionage. Unfortunately, current operational
practices still face significant challenges in containing these
threats as evidenced by the rise in automated botnet networks and
the continued presence of worms released years ago. The goal of
this workshop is to provide a forum for exchanging ideas,
increasing the understanding, and relating experiences on
malicious code from a wide range of communities, including
academia, industry, and the government.

Topics of Interest
==================

We are soliciting papers from researchers and practitioners on
subjects including, but not limited to:

* Automatic malcode detection
* Malicious code characterization
* Botnet detection and disruption
* Malcode reverse engineering
* Modeling and analysis of propagation dynamics
* Forensic methods of attribution
* Threat assessment
* Reactive countermeasures
* Proactive malware defenses
* Significant operational experiences
* Measurement studies
* New threats and related challenges

Submission Instructions
=======================

WORM aims to be a true workshop, with a primary goal of fostering the
development of preliminary work and helping nucleate a malcode
research community. To this end, WORM is open to two classes of
submissions:

1. Research papers

Research papers describe original work and should be at most 8
pages long (double column) in an 11-point font with at least
1-inch margins. Significantly shorter papers will also be
considered in terms of the degree to which they might contribute
to the workshop's goals of fostering a malcode research
community. Papers should list all authors and their affiliations;
in case of multiple authors, the contact author must be
indicated (WORM does not require anonymized submissions). All
accepted papers will appear in the ACM WORM Proceedings.

Note that all papers that are submitted must be original
unpublished work and must not be simultaneously submitted or
under review for any other workshop, conference or
journal (including ACM CCS). Any paper found to be in violation
of these rules will be rejected without review. (We may share
information about submissions with the program chairs of other
conferences considering papers during the review period.) Papers
accompanied by non-disclosure agreement forms will not be
considered. All submissions are treated as confidential, both as
a matter of policy and in accordance with the U.S. Copyright Act
of 1976.

2. Panel proposals

Panel proposals must include the title of the panel, a
2-paragraph abstract describing the topic and why it should be of
interest to the WORM community, and a list of panelists that have
agreed to serve on the panel. Panels are expected to be at most 1
hour long, comprised of short presentations by the panelists
followed by discussion among panel members and the audience;
other formats may be used, but should be described in the
proposal.

Please submit both research papers and panel proposals via the
following Web site:
http://www.auto.tuwien.ac.at/~chris/worm07.html

Program Committee
=================
Christopher Kruegel, Technical University Vienna, Austria (Program Chair)
Kostas Anagnostakis, Institute for Infocomm Research, Singapore
Mike Bailey, University of Michigan, USA
Herbert Bos, Vrije Universiteit Amsterdam, Netherlands
Mihai Christodorescu, University of Wisconsin, Madison, USA
Manuel Costa, Microsoft Research, United Kingdom
Thorsten Holz, University of Mannheim, Germany
Angelos Keromytis, Columbia University, USA
Engin Kirda, Technical University Vienna, Austria
Wenke Lee, Georgia Tech, USA
Jose Nazario, Arbor Networks, USA
Moheeb Rajab, Johns Hopkins University, USA
Stefan Savage, University of California, San Diego, USA
Anil Somayaji, Carleton University, Canada
Dawn Song, Carnegie Mellon University, USA
Vinod Yegneswaran, SRI International, USA

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close