Check out the new USENIX Web site.
Workshop Program

Please Note: This workshop is by invitation only. As a courtesy, we are making the accepted papers available to everyone.

Tuesday, April 10, 2007

8:45 a.m.–9:00 a.m.  
Introduction
Program Chair: Niels Provos, Google Inc.

9:00 a.m.–10:30 a.m.  
Peer-to-Peer

Peer-to-Peer Botnets: Overview and Case Study
Julian B. Grizzard, The Johns Hopkins University; Vikram Sharma, Chris Nunnery, and Brent ByungHoon Kang, University of North Carolina at Charlotte; David Dagon, Georgia Institute of Technology
Read the paper in PDF | HTML

An Advanced Hybrid Peer-to-Peer Botnet
Ping Wang, Sherri Sparks, and Cliff C. Zou, University of Central Florida
Read the paper in PDF | HTML

A Distributed Content Independent Method for Spam Detection
Alex Brodsky, University of Winnipeg; Dmitry Brodsky, Microsoft Corporation
Read the paper in PDF

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m.  
Measurement

The Ghost in the Browser: Analysis of Web-based Malware
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu, Google, Inc.
Read the paper in PDF

My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis, Johns Hopkins University
Read the paper in PDF | HTML

Toward Botnet Mesocosms
Paul Barford and Mike Blodgett, University of Wisconsin—Madison
Read the paper in PDF | HTML

12:30 p.m.–2:00 p.m.    Lunch
2:00 p.m.–3:30 p.m.  
Detection, Response, and Analysis

Wide-Scale Botnet Detection and Characterization
Anestis Karasaridis, Brian Rexroad, and David Hoeflin, AT&T Labs
Read the paper in PDF

Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation
Jan Goebel, RWTH Aachen University, Germany; Thorsten Holz, University of Mannheim, Germany
Read the paper in PDF

AS-Based Accountability as a Cost-Effective DDoS Defense
Daniel R. Simon, Sharad Agarwal, and David A. Maltz, Microsoft Research
Read the paper in PDF | HTML

3:30 p.m.–3:45 p.m.    Break
3:45 p.m.–5:30 p.m.  
Case Studies

Panel: Legal Issues About Botnet Tracking and Response
Panelists: Jon L. Praed, Internet Law Group; Jody R. Westby, Global Cyber Risk, Adjunct Distinguished Fellow to Carnegie Mellon CyLab; David Dagon, Georgia Institute of Technology; Alexander Muentz, OnSite E-Discovery

A Case Study of the Rustock Rootkit and Spam Bot
Ken Chiang and Levi Lloyd, Sandia National Laboratories
Read the paper in PDF | HTML

The Anatomy of Clickbot.A
Neil Daswani, Michael Stoppelman, and the Google Click Quality and Security Teams, Google, Inc.
Read the paper in PDF | HTML

5:30 p.m.–6:00 p.m.  
Work-in-Progress Reports (WiPs) and Wrap-Up

The HotBots '07 program will include slots for Work-in-Progress reports, preliminary results, and "outrageous" opinion statements. We are particularly interested in presentations of student work. To submit, please send a proposal (one page or less) to hotbots07wips@usenix.org.



footer
?Need help? Use our Contacts page.

Last changed: 10 April 2007 jel