Workshop Programme
Time | Title |
---|---|
9:00-10:15 | Welcome and Keynote I |
Welcome and Introduction Sotiris Ioannidis, (Workshop Chair) | |
Keynote: Behind the NICTER: Challenges for Cybersecurity Big Data Daisuke Inoue (NICT)
Abstract: Malware is one of the big root causes of security incidents on the Internet. To fight against sophisticated malware, we have been developing Network Incident analysis Center for Tactical Emergency Response (NICTER). NICTER observes large-scale darknet (i.e., a set of unused IP addresses) and captures quite a few malware samples for grasping nationwide trends of malicious activities. Here we are facing technical challenges to deal with Cybersecurity big data in real-time manner. In this talk, we present an overview of NICTER and its spin-off technologies including a darknet monitoring-based alert system "DAEDALUS" and an anti-APT platform “NIRVANA-KAI". In addition, we explain our big data challenges behind the systems. |
|
10:15-11:15 | Session 1 - Software Analysis |
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen and Christian Platzer | |
The Vulnerability Dataset of a Large Software Ecosystem Dimitris Mitropoulos, Georgios Gousios, Panagiotis Papadopoulos, Vassilios Karakoidas, Panos Louridas and Diomidis Spinellis | |
11:15-11:45 | Coffee Break |
11:45-13:15 | Session 2 - Network Analysis |
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned Iasonas Polakis, Federico Maggi, Stefano Zanero and Angelos D. Keromytis | |
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro and Herve ́ Debar | |
Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research Sebastian Abt and Harald Baier | |
13:15-14:40 | Lunch |
14:40-16:10 | Session 3 - Tools & Techniques |
Collaborative Repository for Cybersecurity Data and Threat Information Jean Lorchat, Cristel Pelsser and Romain Fontugne | |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop Hajime Tazaki, Kazuya Okada, Yuji Sekiya and Youki Kadobayashi | |
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki and Youki Kadobayashi | |
16:10-16:40 | Coffee Break |
16:40-17:40 | Keynote II |
Keynote: Opportunities and Challenges in Large-scale Data Analysis for System Security Davide Balzarotti (Eurecom)
Abstract: The availability of large and comprehensive datasets plays a very important role in system security. For instance, large amount of data are often required to train accurate models, to observe global phenomena, to detect rare events, or to study attack patterns and campaigns. The same concept applies to many security areas ranging from spam to botnet detection, from malware analysis to network intrusion detection systems. |
|
17:40-18:00 | Closing |