征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The 9th IEEE Technically Sponsored International Conference on Malicious and Unwanted Software (MALCON 2014) will be held at the Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 28-30th, 2014 (October 30th, 2014 - optional). This year’s conference has adopted as its main theme "The Malware Threat in the Era of Unlimited Computing Power" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the IT security community in particular. Over the last 12 years, Cloud Computing has become a dominant computing model. Applications and data reside in the “Cloud”, and are accessed via Smartphones and other mobile devices owned and operated by customers, employees, and suppliers no longer part of the traditional enterprise physical network, e.g., “Bring Your Own Device” (BYOD). Within this context, three major research trends have emerged. First, at the periphery, the end-point device is a mobile BYOD with security and mobility properties never anticipated. If the end-point device is owned and operated by the employee of a large corporation, and the boundaries between "personal" and "corporate" data, as well as between applications disappears, then what is the protection model that can be used? Is the device to be "trusted", ”untrusted”, or simply operate in different modes of protection, one when interacting in a corporate environment, and one when being used strictly as a personal device? Second, the existence of either a physical or a logical "Trusted Domain" that resides and operates within the confines of a single corporate entity has disappeared. We invite manuscripts exploring new models of protection that do not depend on ownership or management of a Corporate Trusted Domain, and incorporate elements where part of the data, applications, and infrastructure are managed by third parties such as SalesForce.com, Amazon Web Services (AWS), or even the local Starbucks WiFi. Third, reaching consensus on a protection model for the new cloud computing paradigm is an important challenge – especially developing new standards for measuring protection. Do we protect the traffic? the data? the applications? How do we measure protection? In this last area, we clearly understand that measuring how many resident infected files are detected by an anti-malware product is a very limiting and not very useful measure. We encourage authors to propose innovative solutions to this problem, and the set of associate metrics to be used. Finally, while deservedly significant attention has been, and should continue to be devoted to the research areas described above, another critical problem deserves our attention at this juncture, namely the impact of “Big Data” and, now, “Fast Data” on IT security. The virtually unlimited power and speed of computing resources now available enables a cornucopia of new strategies and tactics for both attackers and defenders. For example, algorithms for running higher order correlations over vast arrays of distributed meta-data in near real-time that were previously only theoretical have now become practical. Contributions that explore the implications and uses of this escalation for both attackers and defenders are welcomed.

征稿信息

征稿范围

Submissions are solicited in, but not limited to, the following areas: Theoretical aspects and new directions in Malware related research, specifically, manuscripts that explore the concepts of “Trust Domains” that do not have or desire physical boundaries Smartphone Malware, protecting a new class of end-points with hyper-mobility Analysis and measurements of real Malware incidents Worms, viruses and other propagating Malware Spyware, keystroke loggers, information theft Malware Honeypots and other sample collection methodologies Botnet attacks, detection/tracking and defense Malware economics and black market studies Code reverse engineering tools and practices Malware performance, analysis and capture tools Anti-spam and anti-phishing techniques and practices Legal aspects of unwanted software use Malware and its impact in social networking and cloud computing Rootkit and virtualization techniques Malware in wireless mobile devices
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月28日

    2014

    10月30日

    2014

  • 10月30日 2014

    注册截止日期

主办单位
IEEE Computer Society
联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询