7:30 am |
Breakfast |
8:30 am |
Welcome / Best Paper Award |
8:35 am |
Keynote: Applying Software Protection to White-Box Cryptograph Michael Wiener, Research Scientist, IRDETO |
9:30 am |
Lightweight Heuristics to Retrieve Parameter Associations from Binaries Franck de Goër de Herve, Roland Groz and Laurent Mounier |
10:00 am |
Break |
10:30 am |
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program Yuichiro Kanzaki, Clark Thomborson, Akito Monden and Christian Collberg |
11:00 am |
Keynote: Binary Analysis in the Wild West Yan Shoshitaishvili, Security Researcher, UCSB |
12:00 pm |
Lunch |
1:00 pm |
Keynote: Security, Verification, and the IoE Stacy Prowell, Research Scientist, Oak Ridge National Laboratory (ORNL) |
2:00 pm |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism Luke Jones, Ryan Whelan, Jeremy Blackthorne and Graham Baker |
2:30 pm |
A Complement to Enhanced Instruction Register File against Embedded Software Falsification Naoki Fujieda, Kiyohiro Sato and Shuichi Ichikawa |
3:00 pm |
Break |
3:30 pm |
OpSeq: Android Malware Fingerprinting Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, and Vassil Roussev |
4:00 pm |
Enriching Reverse Engineering through Visual Exploration of Android Binaries Ashutosh Jain, Hugo Gonzalez and Natalia Stakhanova |
4:30 pm |
Repeatable Reverse Engineering with PANDA Timothy Leek, Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin and Ryan Whelan |
5:00 pm |
InputFinder: Reverse Engineering Closed Binaries via Side Channels Bogdan Copos and Praveen Murthy |
5:30 pm |
Adjourn |
6:00 pm |
Reception |