|
WORKSHOP PROGRAM
All sessions will take place in the Regency 2 Room unless otherwise noted.
Session papers are available to workshop registrants immediately and to everyone beginning April 27, 2010.
|
Tuesday, April 27, 2010
|
8:00 a.m.–9:00 a.m. Continental Breakfast, Regency Foyer |
|
9:00 a.m.–9:45 a.m. |
Keynote Address
Why Don't I (Still) Trust Anything?
Jeff Moss, Founder, Black Hat and DEF CON
|
|
9:45 a.m.–10:35 a.m. |
Botnets
Session Chair: Michael Bailey, University of Michigan
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure
Chris Nunnery, Greg Sinclair, and Brent ByungHoon Kang, University of North Carolina at Charlotte
Read the Abstract | Full paper | Slides
Insights from the Inside: A View of Botnet Management from Infiltration
Chia Yuan Cho, University of California, Berkeley; Juan Caballero, Carnegie Mellon University and University of California, Berkeley; Chris Grier, University of California, Berkeley; Vern Paxson, ICSI and University of California, Berkeley; Dawn Song, University of California, Berkeley
Read the Abstract | Full paper | Slides
|
10:35 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–12:15 p.m. |
Threat Measurement and Characterization
Session Chair: Stefan Savage, University of California, San Diego
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution
Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, and Xin Zhao, Google Inc.
Read the Abstract | Full paper
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous, and Mohamed Ali Kaafar, I.N.R.I.A, France
Read the Abstract | Full paper | Slides
WebCop: Locating Neighborhoods of Malware on the Web
Jack W. Stokes, Microsoft Research; Reid Andersen, Christian Seifert, and Kumar Chellapilla, Microsoft Search
Read the Abstract | Full paper | Slides
|
12:15 p.m.–1:45 p.m. Workshop Luncheon, Regency 1 Room |
|
1:45 p.m.–2:30 p.m. |
Invited Talk
Naked Avatars and Other Cautionary Tales About MMORPG Password Stealers
Jeff Williams, Microsoft Malware Protection Center
|
|
2:30 p.m.–3:45 p.m. |
Threat Detection and Mitigation
Session Chair: Yinglian Xie, Microsoft Research
On the Potential of Proactive Domain Blacklisting
Mark Felegyhazi and Christian Kreibich, International Computer Science Institute; Vern Paxson, International Computer Science Institute and University of California, Berkeley
Read the Abstract | Full paper | Slides
Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling
Willa K. Ehrlich, Anestis Karasaridis, Danielle Liu, and David Hoeflin, AT&T Labs
Read the Abstract | Full paper | Slides
Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries
Kazumichi Sato and Keisuke Ishibashi, NTT Information Sharing Platform Laboratories, NTT Corporation; Tsuyoshi Toyono, Internet Multifeed Co.; Nobuhisa Miyake, NTT Information Sharing Platform Laboratories, NTT Corporation
Read the Abstract | Full paper | Slides
|
3:45 p.m.–4:15 p.m. Break |
|
4:15 p.m.–5:30 p.m. |
New Threats and Challenges
Session Chair: Vinod Yegneswaran, SRI International
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer
Stephen Checkoway and Hovav Shacham, University of California, San Diego; Eric Rescorla, RTFM, Inc.
Read the Abstract | Full paper | Slides
DNS Prefetching and Its Privacy Implications: When Good Things Go Bad
Srinivas Krishnan and Fabian Monrose, University of North Carolina at Chapel Hill
Read the Abstract | Full paper | Slides
Honeybot, Your Man in the Middle for Automated Social Engineering
Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, and Engin Kirda, EURECOM, Sophia-Antipolis, France
Read the Abstract | Full paper | Slides
|
|
5:30 p.m.–6:00 p.m. |
Work-in-Progress Reports (WiPs)
Session Chair: Fabian Monrose, University of North Carolina, Chapel Hill
|
|