what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ACM-CFP2007.txt

ACM-CFP2007.txt
Posted Jun 20, 2007
Site auto.tuwien.ac.at

The 5th ACM Workshop On Recurring Malcode (WORM) 2007 Call For Papers has been announced. It will be held on November 2, 2007 in Alexandria, VA, USA.

tags | paper, worm, conference
SHA-256 | 7ab6cf12db2ea05d1265b04647eb4163b4b0157453df2402b32375452ad9bdcd

ACM-CFP2007.txt

Change Mirror Download
[ please excuse multiple copies of this message ]

*****************************************************************
Paper submission deadline extended: 24 June 2007 (23:59 PST)
*****************************************************************

=======================================
C A L L F O R P A P E R S
=======================================

The 5th ACM WORKSHOP ON RECURRING MALCODE (WORM) 2007

November 2, 2007 in Alexandria, VA, USA

held in association with the 14th ACM Conference on
Computer and Communications Security (CCS)

http://www.auto.tuwien.ac.at/~chris/worm07.html

=================================================================
Important Dates:

Submission deadline: 24 June, 2007 (23:59 PST)
Acceptance Notification: 07 August, 2007
Camera-ready papers: 22 August, 2007

=================================================================

Internet-wide infectious epidemics have emerged as one of the
leading threats to information security and service availability.
Self-propagating threats, often termed worms, exploit software
weaknesses, hardware limitations, Internet topology, and the open
Internet communication model to compromise large numbers of
networked systems. Malware is increasingly used as a beachhead to
launch further malicious activities, such as installing spyware,
deploying phishing servers and spam relays, or performing
information espionage. Unfortunately, current operational
practices still face significant challenges in containing these
threats as evidenced by the rise in automated botnet networks and
the continued presence of worms released years ago. The goal of
this workshop is to provide a forum for exchanging ideas,
increasing the understanding, and relating experiences on
malicious code from a wide range of communities, including
academia, industry, and the government.

Topics of Interest
==================

We are soliciting papers from researchers and practitioners on
subjects including, but not limited to:

* Automatic malcode detection
* Malicious code characterization
* Botnet detection and disruption
* Malcode reverse engineering
* Modeling and analysis of propagation dynamics
* Forensic methods of attribution
* Threat assessment
* Reactive countermeasures
* Proactive malware defenses
* Significant operational experiences
* Measurement studies
* New threats and related challenges

Submission Instructions
=======================

WORM aims to be a true workshop, with a primary goal of fostering the
development of preliminary work and helping nucleate a malcode
research community. To this end, WORM is open to two classes of
submissions:

1. Research papers

Research papers describe original work and should be at most 8
pages long (double column) in an 11-point font with at least
1-inch margins. Significantly shorter papers will also be
considered in terms of the degree to which they might contribute
to the workshop's goals of fostering a malcode research
community. Papers should list all authors and their affiliations;
in case of multiple authors, the contact author must be
indicated (WORM does not require anonymized submissions). All
accepted papers will appear in the ACM WORM Proceedings.

Note that all papers that are submitted must be original
unpublished work and must not be simultaneously submitted or
under review for any other workshop, conference or
journal (including ACM CCS). Any paper found to be in violation
of these rules will be rejected without review. (We may share
information about submissions with the program chairs of other
conferences considering papers during the review period.) Papers
accompanied by non-disclosure agreement forms will not be
considered. All submissions are treated as confidential, both as
a matter of policy and in accordance with the U.S. Copyright Act
of 1976.

2. Panel proposals

Panel proposals must include the title of the panel, a
2-paragraph abstract describing the topic and why it should be of
interest to the WORM community, and a list of panelists that have
agreed to serve on the panel. Panels are expected to be at most 1
hour long, comprised of short presentations by the panelists
followed by discussion among panel members and the audience;
other formats may be used, but should be described in the
proposal.

Please submit both research papers and panel proposals via the
following Web site:
http://www.auto.tuwien.ac.at/~chris/worm07.html

Program Committee
=================
Christopher Kruegel, Technical University Vienna, Austria (Program Chair)
Kostas Anagnostakis, Institute for Infocomm Research, Singapore
Mike Bailey, University of Michigan, USA
Herbert Bos, Vrije Universiteit Amsterdam, Netherlands
Mihai Christodorescu, University of Wisconsin, Madison, USA
Manuel Costa, Microsoft Research, United Kingdom
Thorsten Holz, University of Mannheim, Germany
Angelos Keromytis, Columbia University, USA
Engin Kirda, Technical University Vienna, Austria
Wenke Lee, Georgia Tech, USA
Jose Nazario, Arbor Networks, USA
Moheeb Rajab, Johns Hopkins University, USA
Stefan Savage, University of California, San Diego, USA
Anil Somayaji, Carleton University, Canada
Dawn Song, Carnegie Mellon University, USA
Vinod Yegneswaran, SRI International, USA
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close