2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats 2009 April 22, 2009 to April 24, 2009, Boston, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Effective Malware: The Trade-Off Between Size And Stealth Henry Stern None Security
Malware Analysis Christopher Kruegel None Security Analysis Malware
Pehash: A Novel Approach To Fast Malware Clustering Georg Wicherski None Security Malware
Malware Characterization Through Alert Pattern Discovery Steven Valdes None Security Malware
Towards Automated Detection Of Peer-To-Peer Botnets: On The Limits Of Local Approaches M·rk Jelasity None Security
Ethics In Botnet Research Thorsten Holz , Jose Nazario , Paul Royal , Dave Dittrich , Aaron J. Burstein , Stefan Savage None Security
Malware Analysis Methodology Thorsten Holz None Security Analysis Malware
Spamcraft: An Inside Look At Spam Campaign Orchestration Kirill Levchenko , Chris Kanich , Geoffrey M. Voelker , Stefan Savage , Vern Paxson , Christian Kreibich , Brandon Enright None Security
Temporal Correlations Between Spam And Phishing Websites Henry Stern , Tyler Moore , Richard Clayton None Security Phishing
Phoneyc: A Virtual Client Honeypot Jose Nazario None Security
Malware Behavior Jose Nazario None Security Malware
A Foray Into Conficker'S Logic And Rendezvous Points Phillip Porras , Vinod Yegneswaran , Hassen Saôdi None Security
A View On Current Malware Behaviors Christopher Kruegel , Engin Kirda , Ulrich Bayer , Imam Habibi , Davide Balzarotti None Security Malware