Workshop Program
Please Note: This workshop is by invitation only. As a courtesy, we are making the accepted papers available to everyone.
Tuesday, April 10, 2007
|
8:45 a.m.9:00 a.m. |
|
Introduction
Program Chair: Niels Provos, Google Inc.
|
9:00 a.m.10:30 a.m. |
|
Peer-to-Peer
Peer-to-Peer Botnets: Overview and Case Study
Julian B. Grizzard, The Johns Hopkins University; Vikram Sharma, Chris Nunnery,
and Brent ByungHoon Kang, University of North Carolina at Charlotte; David Dagon,
Georgia Institute of Technology
Read the paper in PDF | HTML
An Advanced Hybrid Peer-to-Peer Botnet
Ping Wang, Sherri Sparks, and Cliff C. Zou,
University of Central Florida
Read the paper in PDF | HTML
A Distributed Content Independent Method for Spam Detection
Alex Brodsky, University of Winnipeg; Dmitry Brodsky,
Microsoft Corporation
Read the paper in PDF
|
10:30 a.m.11:00 a.m. Break |
|
11:00 a.m.12:30 p.m. |
|
Measurement
The Ghost in the Browser: Analysis of Web-based Malware
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu,
Google, Inc.
Read the paper in PDF
My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size
Estimates Remain Challenging
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis, Johns Hopkins University
Read the paper in PDF | HTML
Toward Botnet Mesocosms
Paul Barford and Mike Blodgett, University of WisconsinMadison
Read the paper in PDF | HTML
|
12:30 p.m.2:00 p.m. Lunch |
|
2:00 p.m.3:30 p.m. |
|
Detection, Response, and Analysis
Wide-Scale Botnet Detection and Characterization
Anestis Karasaridis, Brian Rexroad, and David Hoeflin, AT&T Labs
Read the paper in PDF
Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation
Jan Goebel, RWTH Aachen University, Germany; Thorsten Holz, University of Mannheim, Germany
Read the paper in PDF
AS-Based Accountability as a Cost-Effective DDoS Defense
Daniel R. Simon, Sharad Agarwal, and David A. Maltz, Microsoft Research
Read the paper in PDF | HTML
|
3:30 p.m.3:45 p.m. Break |
|
3:45 p.m.5:30 p.m. |
|
Case Studies
Panel: Legal Issues About Botnet Tracking and Response
Panelists: Jon L. Praed, Internet Law Group; Jody R. Westby, Global Cyber Risk, Adjunct Distinguished Fellow to
Carnegie Mellon CyLab; David Dagon, Georgia Institute of Technology; Alexander Muentz, OnSite E-Discovery
A Case Study of the Rustock Rootkit and Spam Bot
Ken Chiang and Levi Lloyd, Sandia National Laboratories
Read the paper in PDF | HTML
The Anatomy of Clickbot.A
Neil Daswani, Michael Stoppelman, and the Google Click Quality and Security Teams, Google, Inc.
Read the paper in PDF | HTML
|
5:30 p.m.6:00 p.m. |
|
Work-in-Progress Reports (WiPs) and Wrap-Up
The HotBots '07 program will include slots for Work-in-Progress reports, preliminary results, and "outrageous" opinion statements. We are particularly interested in presentations of student work.
To submit, please send a proposal (one page or less) to hotbots07wips@usenix.org.
|
|
|