The 11th International Conference on Malicious and Unwanted Software (MALCON 2016) will be held at the Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 18-21st, 2016 (October 20th, 2016 - optional). The Focus of the conference this year is twofold - (1) Security architectures & reformulated solutions, and (2) The demise of traditional end-point protection. The topics are described in the paragraphs below. click here For the CFP.
Security Architectures & Reformulated Solutions
In the past, the security protection model that most organizations applied to protect their infrastructure was simply the "Everything but the Kitchen Sink" model—meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base., and on, and on.... In essence, this model simply amounted to the accumulation of security devices. Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed.
In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) threats are often distributed both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you
detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the ability to provide early warnings and execute countermeasures that minimize both products vulnerability and damage from cyber-attackers. Security products are no longer about single or even multiple independent security devices each providing close-as-we-can-get-to-perfect standalone protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into |
wide-angle actionable information applicable to your specific enterprise environment. We call this approach the “Fabric of Security” , see [Colon Osorio].This approach has led to the specification of several new (and revived) security architectures. Some are “open” (e.g., Blue Coat Open Architecture) while others are more proprietary, such as the Security Control Framework (SCF) and SAFE architectures from Cisco
The conference organizers encourage participants to submit manuscripts evaluating alternate security architectures including analyses of their practical effectiveness when actually deployed.
The Demise of Traditional End-point Protection
The second topic that the conference will address this year, is that of the declined importance of traditional end-point security that treat end-points as isolated and securable trusted zones. As the computer industry has evolved to a "Cloud-based Computing Model", where applications
and data are accessible from anywhere in the world using mobile devices such as Smartphones and tablets, protecting end-point devices as well as protecting the integrity of cloud-based applications and data, and even user accounts, has become paramount. Within this context, conference organizers seek manuscripts describing and contrasting this paradigm shift; manuscripts that address security in the Cloud-based Computing Model; and manuscripts that compare and contrast the effectiveness of end-point centric protection versus cloud-based security solutions. In addition to the above themes submissions are solicited in, but not limited to, the following areas as well: |
• Combating Broad Spectrum Malware amidst changing reality of network walls and end-point trusted zones.
• Evolving nature of Cyberattacks, including advanced targeted attacks, Ransomware, crypto lockers, phishing, etc.
• Malware and its impact in social networking and cloud computing.
• Enterprise security in the presence of BYOD devices and Smartphone malware.
• Analysis and measurements of real malware incidents, and security architectures.
• Botnet attacks, detection/tracking and defense.
• Malware economics and black market studies.
• Code reverse engineering tools and practices.
• Malware performance, analysis and capture tools
• Legal aspects of cyber security, including risk and compliance issues impacting executive decisions.
Publication
The proceedings of the conference will be published in printed and DVD form and will be included in the IEEE Xplore digital library. In addition, the Conference’s Technical Program Committee will select one manuscript as a recipient of the “Best Paper Award”. The Best Paper Award author, together with the authors of a few selected manuscripts from the conference, will be invited to submit an extended version to a special issue of the Journal of Computer Security.
Paper Submission Information
Papers should be submitted through EDAS system at:
Submitted manuscripts must be 10-point font size, and should not exceed 8 single-spaced pages in length, including the abstract, figures, and references. Authors whose manuscript exceeds the 8 page limit may be allowed to include two additional pages for an extra charge. However, under no circumstances shall a submitted manuscript exceed the 10 page limit. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
Additional Information
For more information on Malware 2016 or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair, Malware 2016 at This email address is being protected from spambots. You need JavaScript enabled to view it. or visit our web site www.malwareconference.org. For information concerning submission of an original manuscript to the conference, please contact the Technical Program Committee Chairs (TPC), Dr. Anthony Arrott, CheckVir, USA – This email address is being protected from spambots. You need JavaScript enabled to view it., and Prof. Arun Lakhotia, University of Louisiana at Lafayette - This email address is being protected from spambots. You need JavaScript enabled to view it..
Malware 2016 Program Committee
General Program Chair:
· Dr. Fernando C. Colon Osorio, WSSRL and Brandeis University, USA
Technical Program Committee Co-Chairs:
· Dr. Anthony Arrott, CheckVir, USA
· Prof. Arun Lakhotia, University of Louisiana at Lafayette
Technical Program Committee Members :
· Mr. Dennis, Batchelder, Microsoft Corporation, USA
· Mr. Frédéric Besson, Inria, France
· Dr. Guillaume Bonfante, LORIA, France
· Prof. Richard Brooks, Clemson University, USA
· Dr. Andreas Clementi, AV Comparatives, Germany
· Dr. Seyit A. Camtepe, Technische Universität Berlin, Germany
· Dr. Olivier Festor, INRIA Nancy Grand-Est, France
· Mr. Ivan Macalintal, Microsoft, USA
· Dr. Ferenc Leitold, Veszprog, Hungary
· Prof. Jean-Yves Marion, École des mines de Nancy, France,
· Prof. Todd McDonald, University of South Alabama, USA
· Dr. Jose Andres Morales, CERT - Carnegie Mellon University, USA
· Dr. Jose Ortiz, Universidad de Puerto Rico, Rio Piedras Campus, Puerto Rico
· Prof. Golden G Richard, University of New Orleans, USA
· Dr. Aubrey-Derrick Schmidt, T-Systems International GmbH, Germany
· Dr. Axel Simon, Technical University, Munich, Germany
· Prof. Natalia Stakhanova, University of New Brunswick, CA
· Prf. Mark Stamp - San Jose State University, USA
· Dr. Andrew Walenstein, Blackberry, USA
· Mr. Jeff Williams, Dell SecureWorks, USA
· Prof. Cliff C. Zou (Changchun Zou), University Central Florida, USA
Malware 2016 Keynote, Panels & Tutorials :
· Mr. Neil Rubenking, PC Magazine
Local Conference Chair
· Prof. Jose Ortiz, Computer Science, Universidad de Puerto Rico, USA
· Mr. Javier Abreu, PRSS Developer Services Manager at Microsoft, USA
Submission of papers |
|
Research Track |
Submissions are Now Closed |
Research Track Abstract Deadline |
Submissions are Now Closed |
Industry Track |
Submissions are Now Closed |
Short Paper Track |
Submissions are Now Closed |
Notification of Acceptance |
September 1st, 2016, 23:59:59 EST |
Camera ready paper: |
September 8th, 2016: 23:59:59 EST |
Conference dates |
October 18-21st, 2016 |
Click Here to Submit a Manuscript
Travel Arrangements:
Airlines:
From the East Coast of the US:
Boston To SJU: JetBlue has three noon-stops a day ( 6:30 AM, 10:45 AM, and 11:55 PM, with a typical fare of $ 432.00 round trip
NYC to SJU - JetBlue has 8 non-stop flights starting a 6:30 AM, with the last flight departing at 11:35 PM with a typical fare of $ 356.00 round trip
Washington, DC to SJU - One daily flight non-stop with Jet Blue at 8 AM. Cost at about $400 round trip.
Philadelphia to SJU - 3 Non-Stops a day with American Airlines, Cost at around $420.00 round-trip
From the West Coast of the US:
San Francisco Area to SJU - Delta or American Airlines. Several 1-stop through NYC, Dallas or Miami. Cost around $500.00 round trip.
Combining Your Attendance to MALCON with Virus Bulletin, October 5-7, 2016 in Denver, Colorado.
1. If you attend VB only, then air fare is:
Frankfurt - Denver 3 - 8 Oct
from $1083 (1 stop - Condor thru Seattle or Icelandic thru Reykjavik)
from $1644 (non-stop - United, Lufthansa)
2. If you combine VB with MALCON, then,
VB + MalCon conferences with weekend in Colorado Rockies
Frankfurt - Denver 3 Oct
Denver - San Juan 10 Oct
San Juan - Frankfurt 15 Oct
from $1483 (all 1 stop or less - United/American)
Hotel Transportation:
There are two Basic ways. Namely using the hotel services at around $85.00 round trip or a private taxi - at around $100 for 3-4 passengers.