5th USENIX Workshop on Large-Scale Exploits and Emergent Threats 2012 April 24, 2012 to April 24, 2012, San Francisco, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Engin Kirda N/A Security
Challenges in Network Application Identification Alok Tongaonkar , Ram Keralapura , Antonio Nucci The evolution of the Internet in the last few years has been characterized by dramatic ... Network ExcludeThinkstScapes
Sherlock Holmes and the Case of the Advanced Persistent Threat Ari Juels , Ting-fang Yen An Advanced Persistent Threat (APT) is a tar- geted attack against a high-value asset or ... ExcludeThinkstScapes Advanced Persistent Threat
Let's Parse to Prevent Pwnage Mike Samuel , Ulfar Erlingsson Software that processes rich content suffers from en- demic security vulnerabilities. Frequently, these bugs are ... IncludeThinkstScapes Data Confusion Parsing
Observations on Emerging Threats Paul Ferguson Trend Micro's Threat Research group is specially tasked with looking forward on the threat landscape ... Introductory Predictions ExcludeThinkstScapes
W32.Duqu: The Precursor to the Next Stuxnet Eric Chien , Liam Omurchu , Nicolas Falliere N/A ExcludeThinkstScapes Duqu Attack
So You Want to Take Over a Botnet... Dave Dittrich Computer criminals regularly construct large dis- tributed attack networks comprised of many thousands of compromised ... Botnets ExcludeThinkstScapes
Classification of UDP Traffic for DDoS Detection Xinming Ou , Alexandru g. Bardas , Loai Zomlot , Sathya chandran Sundaramurthy , S. raj Rajagopalan , Marc Eisenbarth UDP traffic has recently been used extensively in flooding-based distributed denial of service (DDoS) at- ... ExcludeThinkstScapes UDP DDoS
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web Thorsten Holz , Armin Bscher Known for a long time, Distributed Denial-of-Service (DDoS) attacks are still prevalent today and cause ... Botnets ExcludeThinkstScapes
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks Yeongung Park , Choonghyun Lee , Chanhee Lee , Jihyeog Lim , Sangchul Han , Minkyu Park , Seong-je Cho Recent malware often collects sensitive information from third-party applications with an illegally escalated priv- ilege ... Android ExcludeThinkstScapes Defence
Clustering Potential Phishing Websites Using DeepMD5 Jason Britt , Brad Wardman , Dr. alan Sprague , Gary Warner Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive ... Phishing IncludeThinkstScapes
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis Tudor Dumitras , Petros Efstathopoulos The Internet can be a dangerous place: 800,000 new mal- ware variants are detected each ... Statistics ExcludeThinkstScapes Telemetry
Adapting Social Spam Infrastructure for Political Censorship Chris Grier , Kurt Thomas , Vern Paxson As social networks emerge as an important tool for political engagement and dissent, services including ... Socialbots Big Data IncludeThinkstScapes
Key Challenges in Defending Against Malicious Socialbots Konstantin Beznosov , Yazan Boshmaf , Ildar Muslukhov , Matei Ripeanu The ease with which we adopt online personas and re- lationships has created a soft ... Challenges Socialbots ExcludeThinkstScapes