RAID 2009 program

Wednesday 23rd

12h30 - 14h00: Registration

14h00 - Opening by Ludovic Mé [slides] and Engin Kirda [slides]

14h30 - 15h30: Invited talk: Luis Corron (Panda Security). Fighting Malware. [slides]

15h30 - 16h00: Coffee break

16h00 - 18h00: Anomaly and Specification-Based Approaches
Chair: Radu State

Damiano Bolzoni, Sandro Etalle and Pieter Hartel. Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems [slides]

Federico Maggi, William Robertson, Christopher Kruegel and Giovanni Vigna. Protecting a Moving Target: Addressing Web Application Concept Drift [slides]

Gabriela Cretu-Ciocarlie, Angelos Stavrou, Michael Locasto and Salvatore Stolfo. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating [slides]

Martin Rehak, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek and Karel Bartos. Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems [slides]

18h00-20h00: Poster session

Thursday 24th

9h00 - 10h30: Malware Detection and Prevention (I)
Chair: Thorsten Holz

Grégoire Jacob, Hervé Debar and Eric Filiol. Malware Behavioral Detection by Attribute-Automata using Abstraction from Platform and Language [slides]

Scott Schneider, Kent Griffin, Tzi-cker Chiueh and Xin Hu. Automatic Generation of String Signatures for Malware Detection [slides]

M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, and Muddassar Farooq. PE-miner: Mining Structural Information to Detect Malicious Executables in Real-Time [slides]

10h30 - 11h00: Coffee break

11h00 - 12h30: Network and Host Intrusion Detection and Prevention
Chair: Corrado Leita

Peng Li, Debin Gao and Mike Reiter. Automatically Adapting a Trained Anomaly Detector to Software Patches [slides]

Juan Caballero, Zhenkai Liang, Pongsin Poosankam and Dawn Song. Towards Generating High Coverage Vulnerability-based Signatures with Protocol-level Constraint-guided Exploration

Jérôme François, Humberto Abdelnur, Radu State and Olivier Festor. Automated Behavioral Fingerprinting [slides]

12h30 - 14h00: Lunch

14h00 - 15h30: Intrusion Detection for Mobile Devices
Chair: Benjamin Morin

Guanhua Yan, Stephan Eidenbenz and Emanuele Galli. SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection [slides]

Saira Zahid, Muhammad Shahzad, Syed Ali Khayam and Muddassar Farooq. Keystroke-based User Identification on Smart Phones [slides]

Lei Liu, Guanhua Yan, Xinwen Zhang and Songqing Chen. VirusMeter: Preventing Your Cellphone from Spies [slides]

15h30 - 16h00: Coffee break

16h00 - 17h00: Invited talk : Roy Maxion (CMU). When Science Meets Security.

17h00: Departure for the Mount Saint Michael (visit of the abbey and conference diner)

Friday 25th

9h00 - 10h00: High-performance Intrusion Detection
Chair: Robin Sommer

Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Evangelos Markatos and Sotiris Ioannidis. Regular Expression Matching on Graphics Hardware for Intrusion Detection [slides]

Daniel Luchaup, Randy Smith, Cristian Estan and Somesh Jha. Multi-Byte Regular Expression Matching with Speculation

10h00 - 10h30: Coffee break

10h30 - 11h30: Malware Detection and Prevention (II)
Chair: Davide Balzarotti

Chaoting Xuan, John Copeland and Raheem Beyah. Toward Revealing Kernel Malware Behavior in Virtual Execution Environments [slides]

Jaideep Chandrashekar, Frederic Giroire, Nina Taft, Eve Schooler and Dina Papagiannaki. Exploiting Temporal Persistence to Detect Covert Botnet Channels [slides]

11h30: Concluding remarks

12h00 - 13h30: Lunch