The 10th International Conference on Malicious and Unwanted Software  (MALCON 2015) will be held at the Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 20-22nd, 2015 (October 22nd, 2015 - optional). The emergence of Targeted Attacks as the predominant threat to large organizations, as well as governments, has created the opportunity within the Anti-Malware EcoSystem to create a forum where this topic is addressed in a cooperative manner. Hence, this year the Malware Conference will consist of two distinct tracks. These are: Broad Spectrum Malware Track; and Targeted Attacks Track  click here For the CFP.

We refer to Broad Spectrum Malware as to malicious code that exploits a vulnerability in the system to do harm, and or are metamorphic and polymorphic variations of such and are used by cyber attackers to target more than one specific victim.  (In contrast to specifically targeted attacks,  which are custom-designed and carried out against a singular or a narrow specific class of victims.). In the past, most of the attention, resources, and evaluation of Security products has been directed exclusively to Broad Spectrum Malware.

 

The second track being contemplated  will deal exclusively with the emergence of Targeted Attacks, whereas customize Malware, as well as other techniques are  used by Nation States and/or or Criminal Syndicates to target a single organization. It is often the case where both researchers, as well as practitioners, bundle both Broad Spectrum Malware and Targeted Attacks  together, albeit, they are significantly different both in time and space.

 

Within each track we have organized the conference into three segments: (1) new generation of threats; (2) new advances designed to thwart the threat, and the evaluation of security products in terms of their ability to deal with the threat. We encourage authors to submit manuscripts that addresses issues in each one of these new research directions.

 

Submissions are solicited in, but not limited to, the following areas:

 

•  Theoretical aspects and new directions in Broad Spectrum Malware related research, specifically, manuscripts that explore the concepts of “Trust Domains” that do not have or desire physical boundaries

•  Targeted Attacks

•  Smartphone Malware, protecting a new class of end-points with hyper-mobility

•  Analysis and measurements of real malware incidents

•  Worms, viruses and other propagating Malware

•  Spyware, keystroke loggers, information theft Malware

•  Honeypots and other sample collection methodologies

•  Botnet attacks, detection/tracking and defense

•  Malware economics and black market studies

•  Code reverse engineering tools and practices

•  Malware performance, analysis and capture tools

•  Anti-spam and anti-phishing techniques and practices

•  Legal aspects of unwanted software use

•  Malware and its impact in social networking and cloud computing

•  Rootkit and virtualization techniques

•  Malware in wireless mobile devices

 

Finally, and within the context of our two important tracks, we are delighted to announce that for the 10th year anniversary of the Malware Conference our Keynote Speaker will be Prof. Vern Paxson, from the University of California at Berkeley. Dr. Paxson is a fellow of the Association for Computing Machinery (ACM), and a well know and highly respected researcher in the fields of Internet measurement and Internet security. Vern will be sharing with us his perspective on Broad Spectrum Attacks, what is to be expected in the future, and some new work that his research organization is currently pursuing.

 

Publication

 

The proceedings of the conference will be published in printed, and DVD, form and will be included in the IEEE Xplore digital library.  In addition, the Conference’s Technical Program Committee will select one manuscript as a recipient of the “Best Paper Award”.  The Best Paper Award author, together with the authors of a few selected manuscripts from the conference, will be invited to submit an extended version to a special issue of the Journal of Computer Security.

 

Paper Submission Information

 

Papers should be submitted through EDAS system at:

 

http://www.edas.info/

 

Submitted manuscripts must be 10-point font size, and should not exceed 8 single-spaced pages in length, including the abstract, figures, and references. Authors whose manuscript exceeds the 8 page limit may be allowed to include two additional pages for an extra charge.  However, under no circumstances shall a submitted manuscript exceed the 10 page limit. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

 

Additional Information

 

For more information on Malware 2015  or if you are interested in contributing to the organization of the conference please contact Dr. Fernando C. Colon Osorio, General Program Chair, Malware 2015 at or visit our web site www.malwareconference.org.  For information concerning submission of an original manuscript to the conference, please contact the Technical Program Committee Chairs (TPC), Dr. Anthony Arrott, Trends Micro, USA - mailto: , and Prof. Arun Lakhoita,  Director of CajunBot Lab,  University of Louisiana at Lafayette - mailto: .

 

Submission of papers

 

Broad Spectrum Malware Track

 July 8th, 2015, 23:59:59 EST

Industry Track

Aug 12th, 2015, 23:59:59 EST

Short Paper Track

Aug 12th,, 2015, 23:59:59 EST

Notification of Acceptance

September 1st, 2015, 23:59:59 EST

Camera ready paper:

September 8th, 2015: 23:59:59 EST

Conference dates

October 20-22, 2015

Click Here to Submit a Manuscript