|
Software Security, Protection, and Reverse Engineering Workshop Hilton Los Angeles/Universal City, Los Angeles, CA
December 5-6, 2016
Collocated with
ACSAC
2016
Workshop Program
Monday, December 5th
7:30 am |
Breakfast |
8:30 am |
Welcome and Best Paper Award |
8:40 am |
Training Session: Whitebox Crypto Attacks Jasper von Woudenberg, RISCURE |
10:00 am |
Break |
10:30 am |
Training Session: Whitebox Crypto Attacks Jasper von Woudenberg, RISCURE |
12:00 pm |
Lunch |
1:30 pm |
Training Session: Concolic Analysis Vivek Notani, University of Verona |
3:00 pm |
Break |
3:30 pm |
Training Session: Concolic Analysis Vivek Notani, University of Verona |
5:00 pm |
Invited Talk: Transition to Practice NSF SATC Program Dr. Alec Yasinsac, University of South Alabama |
5:30 pm |
Adjourn |
Tuesday, December 6th
7:30 am |
Breakfast |
8:30 am |
Welcome |
8:35 am |
Keynote: Secure Development After Security Bugs Jeremy Epstein, Program Manager, DARPA |
9:30 am |
Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free Josselin Feist, Mounier Laurent, Sebastien Bardin, Robin David, and Marie-Laure Potet |
10:00 am |
Break |
10:30 am |
Metadata Recovery From Obfuscated Programs Using Machine Learning (Best Paper Award) Aleieldin Salem and Sebastian Banescu |
11:00 am |
Keynote: Industry Trends in Software Attack Jasper von Woudenberg, CTO North America, RISCURE |
12:00 pm |
Lunch |
1:00 pm |
Keynote: Information Flow Obfuscation Saumya Debray, Professor, University of Arizona |
2:00 pm |
White-Box Cryptography-Practical Protection on Hostile Hosts Yuan Gu, Harold Johnson, Clifford Liem, Andrew Wajs, and Michael Wiener |
2:30 pm |
Comparing the Effectiveness of Commercial Obfuscators against MATE Attacks Ramya Manikyam, Todd McDonald, William Mahoney, Todd Andel, and Samuel Russ |
3:00 pm |
Break |
3:30 pm |
Tightly-Coupled Self-Debugging Software Protection Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert |
4:00 pm |
Active Android Malware Analysis: An approach based on Stochastic Games Riccardo Sartea, Mila Dalla Preda, Alessandro Farinelli, Roberto Giacobazzi, and Isabella Mastroen |
4:30 pm |
Buffer Overflow Attack's Power Consumption Signatures Samuel Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey McDonald, and Todd R. Ande |
5:00 pm |
Detecting Rootkits With the RAI Runtime Application Inventory Shabnam Aboughadareh and Christoph Csallner |
5:30 pm |
Adjourn |
6:00 pm |
ACSAC Welcome Reception |
|
|
|