Skip to content

LEET '10 Call for Papers

The call for papers for the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '10) Botnets, Spyware, Worms, and More just went out. It will be held on April 27, 2010 in San Jose, CA.

LEET '10 will be co-located with the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI '10), which will take place April 28–30, 2010.

Important Dates
  • Submissions due: Thursday, February 25, 2010, 11:59 p.m. PST
  • Notification of acceptance: Wednesday, March 24, 2010
  • Final papers due: Monday, April 5, 2010

Workshop Organizers
Program Chair
  • Michael Bailey, University of Michigan
Program Committee
  • Dan Boneh, Stanford University
  • Nick Feamster, Georgia Institute of Technology
  • Jaeyeon Jung, Intel Labs, Seattle
  • Christian Kreibich, International Computer Science Institute
  • Patrick McDaniel, Pennsylvania State University
  • Fabian Monrose, University of North Carolina, Chapel Hill
  • Jose Nazario, Arbor Networks, Inc.
  • Stefan Savage, University of California, San Diego
  • Matt Williamson, AVG Technologies
  • Yinglian Xie, Microsoft Research
  • Vinod Yegneswaran, SRI International

Go submit your work!
Categories: Malware, News, Security, SpyBye, Systrace
Defined tags for this entry: , , ,

LEET '09 Call for Papers

The CfP for the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09): Botnets, Spyware, Worms, and More is up at:

http://www.usenix.org/event/leet09/cfp/.

LEET '09 will be held on April 21, 2009 in Boston, MA immediately before the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), which will take place April 22–24, 2009.

Important Dates
  • Submissions due: January 16, 2009, 11:59 p.m. EST
  • Notification of acceptance: March 2, 2009
  • Electronic files due: March 30, 2009

This will be the second edition of LEET, which had evolved from the combination of two other successful workshops, the ACM Workshop on Recurring Malcode (WORM) and the USENIX Workshop on Hot Topics in Understanding Botnets (HotBots). These two workshops have each dealt with aspects of this problem. However, while papers relating to both worms and botnets are explicitly solicited, LEET has a broader charter than its predecessors. We encourage submissions of papers that focus on any aspect of the underlying mechanisms used to compromise and control hosts, the large-scale "applications" being perpetrated upon this framework, or the social and economic networks driving these threats.
Categories: News, Security, Systrace
Defined tags for this entry: , , ,

The Ghost In The Browser

During HotBots last month, I presented a paper on a systematic approach for detecting malware on the web called "The Ghost In The Browser". The paper enumerates all the different ways in which a web page can become malicious and contains some measurements on the prevalance of drive-by-downloads; an in depth analysis of 4.5 million URLs detected 450,000 that were surreptitiously installing malware. All the more reason for tools such as SpyBye. Fortunately, I am not the only one working on such tools. Christian Seifert from the New Zealand Honeypot Alliance recently announced a web interface to their Capture honey client which runs a browser against URLs specified by you. In a similar vein, Shelia is a tool that scans your mail folder and follows URLs contained in it for malware and exploits.
Categories: Malware, SpyBye
Defined tags for this entry: , ,