(PDF booklet version)
Wednesday, June 27, 2018
- 15:00 – DIMVA 2018 registration opens
- 15:30 – 17:00 Panel Session
- 17:00 – 20:00 Joint DIMVA/ESSoS 2018 Poster Session and Cocktail
- 20:30 – Bus to Massy Palaiseau and Paris
Thursday, June 28, 2018
- 08:00 – 09:00 Registration
- 09:00 – 09:15 DIMVA Welcome
- 09:15 – 10:30 Keynote 1
- 10:30 – 11:00 Coffee Break
- 11:00 – 12:30 Session 1: Malware Analysis
- 12:30 – 14:00 Lunch Break
- 14:00 – 15:30 Session 2: Mobile and Embedded Security
- 15:30 – 16:00 Coffee Break
- 16:00 – 17:30 Session 3: Attacks
- 18:00 – 23:00 Conference Dinner cruise on the Seine river
- 23:00 – Bus back to Massy-Palaiseau and Campus Paris-Saclay
Friday, June 29, 2018
- 08:30 – 09:15 Registration
- 09:15 – 10:30 Keynote 2
- 10:30 – 11:00 Coffee Break
- 11:00 – 12:30 Session 4: Detection and Containment
- 12:30 – 14:00 Lunch Break
- 14:00 – 15:30 Session 5: Web & Browser Security
- 15:30 – 16:00 Coffee Break
- 16:00 – 17:15 Session 6: Reverse Engineering
- 17:15 – 17:30 Closing Remarks
Wednesday, June 27, 2018
Registration
15:00 – | DIMVA 2018 registration |
Panel Session
Chair: TBA
15:30 – 17:00 | Panel: Engineering Secure IoT Systems – A grand challenge or pipe dream? |
Poster Session & Cocktail
17:00 – 20:00 | Joint DIMVA/ESSoS 2018 Poster Session & Cocktail |
20:30 – | Bus to Massy-Palaiseau station and to Paris |
Thursday, June 28, 2018
Registration
08:00 – 09:00 | DIMVA 2018 registration |
Opening
09:00 – 09:15 | DIMVA Welcome |
Keynote
Chair: Cristiano Giuffrida
09:15 – 10:30 | Azure Confidential Computing (Abstract) Manuel Costa (Microsoft Research Cambridge) |
Coffee Break
10:30 – 11:00 | Coffee Break |
Session 1: Malware Analysis
Session Chair: Magnus Almgren
11:00 – 11:30 | Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt |
11:30 – 12:00 | MemScripper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps
Michael Brengel, Christian Rossow |
12:00 – 12:30 | Spearphishing Malware: Do We Really Know the Unknown?
Yanko Baychev, Leyla Bilge |
Lunch Break
12:30 – 14:00 | Lunch Break |
Session 2: Mobile and Embedded Security
Session Chair: Yanick Fratantonio
14:00 – 14:30 | Honey, I Shrunk Your App Security: The State of Android App Hardening
Vincent Haupert, Dominik Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller |
14:00 – 15:00 | GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM
Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi |
15:00 – 15:30 | BinArm: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, |
Coffee Break
15:30 – 16:00 | Coffee Break |
Session 3: Attacks
Session Chair: Pavel Laskov
16:00 – 16:30 | Update State Tampering: A Novel Adversary Post-Compromise Technique on Cyber Threats
Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee |
16:30 – 17:00 | Evasive Malware via Identifier Implanting
Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow |
17:00 – 17:30 | On the Weaknesses of Function Table Randomization
Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz |
Conference Dinner
18:00 – 23:00 | Conference Dinner cruise on the Seine river |
23:00 – | Bus to Massy-Palaiseau station and to Campus Paris-Saclay |
Friday, June 29, 2018
Registration
08:30 – 09:15 | DIMVA 2018 registration |
Keynote
Chair: Cristiano Giuffrida
09:15 – 10:30 | Cyberattacks on Election Infrastructure (Abstract) Alex Halderman (University of Michigan) |
Coffee Break
10:30 – 11:00 | Coffee Break |
Session 4: Detection and Containment
Session Chair: Sven Dietrich
11:00 – 11:30 | FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds
Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero |
11:30 – 12:00 | No Random, No Ransom: A Key to Stop Cryptographic Ransomware
Ziya Alper Genç, Gabriele Lenzini, Peter Y.A. Ryan |
12:00 – 12:30 | Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin |
Lunch Break
12:30 – 14:00 | Lunch Break |
Session 5: Web and Browser Security
Session Chair: Michael Meier
14:00 – 14:30 | Knockin’ on Trackers’ Door: Large-Scale Automatic Analysis of Web Trackers
Iskander Sanchez-Rola, Igor Santos |
14:30 – 15:00 | JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
Aurore Fass, Robert Krawczyk, Michael Backes, Ben Stock |
15:00 – 15:30 | Bytecode Corruption Attacks Are Real – And How to Defend Against Them Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz |
Coffee Break
15:30 – 16:00 | Coffee Break |
Session 6: Reverse Engineering
Session Chair: Georgios Portokalidis
16:00 – 16:30 | ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero |
16:30 – 17:00 | Symbolic Deobfuscation: From Virtualized Code Back to the Original
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet |
17:00 – 17:15 | Extended Abstract: Toward Systematically Exploring Antivirus Engines
Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero |
Closing Remarks
17:15 – 17:30 | Closing Remarks |