|
Hilton Orlando Lake Buena Vista, Orlando, FL, USA
December 4-5, 2017
Collocated with
ACSAC
2017
Workshop Program
Monday, December 4th
7:30 am |
Breakfast |
8:30 am |
Welcome |
8:35 am |
Training Session: Concolic Analysis Vivek Notani, University of Verona |
10:00 am |
Break |
10:30 am |
Training Session: BINSEC: A Framework for Binary-level Program Analysis Sébastien Bardin and Richard Bonichon, CEA |
12:00 pm |
Lunch |
1:30 pm |
Training Session: Breaking Obfuscated Programs with Symbolic Execution Sebastian Banescu, Technical University of Munich |
3:00 pm |
Break |
3:30 pm |
Training Session: Breaking Obfuscated Programs with Symbolic Execution
|
4:30 pm |
Adjourn |
Tuesday, December 5th
7:30 am |
Breakfast |
8:30 am |
Welcome |
8:35 am |
Keynote: The Rise of Potentially Unwanted Programs: Measuring its Prevalence, Distribution through Pay-Per-Install Services, and Economicss Juan Caballero, IMDEA Software Institute |
9:30 am |
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities Niccolò Marastoni, Andrea Continella, Davide Quarta, Stefano Zanero and Mila Dalla Preda |
10:00 am |
Break |
10:30 am |
Lightweight Dispatcher Constructions for Control Flow Flattening: Björn Johansson, Patrik Lantz and Michael Liljenstam |
11:00 am |
Keynote: Inferring Program Behavior from a Distance for Cyber Attack Investigation Dongyan Xu, Purdue University |
12:00 pm |
Lunch |
1:30 pm |
Fast Model Learning for the Detection of Malicious Digital Documents Daniel Scofield, Craig Miles and Stephen Kuhn |
2:00 pm |
Differential Fault Analysis Using Symbolic Execution Jasper Van Woudenberg, Cees-Bart Breunesse, Rajesh Velegalati, Panasayya Yalla and Sergio Gonzalez |
2:30 pm |
Packer Identification Based on Metadata Signature Nguyen Minh Hai, Mizuhito Ogawa and Quan Thanh Tho |
3:00 pm |
Break |
3:30 pm |
Evaluating Optimal Phase Ordering in Obfuscation Executives William Holder, Jeffrey McDonald and Todd Andel
|
4:00 pm |
Adjourn |
6:00 pm |
ACSAC Welcome Reception |
|
|
|