The 27th CREST Open Workshop

 

Malware

Date:  29 -30 May 2013

Venue: Engineering Front Executive Suite, Roberts Building, UCL (Directions, or 'C5' on the map here, or Find it on Google maps.)

Overview:

Harmful software, dubbed malware, has become part of the networked environment in which we work and carry out our daily lives. There has been a steady trend towards increase in both the sophistication of the final product and the automation of its production.  In addition, our current existential scenario is increasingly dominated by the sheer volume of malware variations. Another trend is the migration of production and management of malware from the province of amateurs to that of professionals , including organised crime and, allegedly, state actors. These trends call for a response, particularly from the academic program analysis community. Analysis of binaries has been largely a backwater in program analysis until the recent past, partly because of its perceived difficulty, and the field has been left to commercial firms. This workshop seeks to stimulate and fertilise discussion and co-operation within the academic community over the program analysis of binary code.

 

Programme (Downloadable Programme in PDF):

                                                  +++++++++29 May 2013 – DAY 1+++++++++

 

 9:30    Arrival, Coffee and Pastries

10:00   Welcome and Introductions

              David Clark, CREST Centre, SSE Group, Department of Computer Science, UCL, UK

10:30   Exploit-Generation with Acceleration (Slides, Videos240p, 360p)

              Daniel Kroening, Department of Computer Science, University of Oxford, UK   

11:15   Executable clustering 

              Steven Poulson, Department of Computer Science and Information Systems, Birkbeck, University of London, UK

12:00   Sandwich lunch at the venue

13:00   Untangling the code: An overview of techniques to reverse engineer malicious software (Slides, Videos240p, 360p)

              Prashant Gupta, McAfee Labs, UK

13:45   Type recovery as SMT

              Ed Robbins, School of Computing, University of Kent, UK

14:30   Refreshments

15:00   Approximate Program Transformation (SlidesVideos240p, 360p)

              Alessandra Di Pierro, Dipartimento di Informatica, University of Verona, Italy

15:45   Rendezvous: a search engine for binary code (Slides, Videos240p, 360p)

              Wei-Ming Khoo, Computer Laboratory, University of Cambridge, UK

16:30   Discussion

17:00   Wrap up

17:15   End of day 1

                                                 +++++++++30 May 2013 – Day 2+++++++++

9:30     Arrival, Coffee and Pastries

10:00   Heuristics for Inferring API Semantics to Address Mimicry Attacks

              Mihai Christodorescu, Qualcomm Research Silicon Valley, USA

10:45   Static Analysis of Virtualization-Obfuscated Binaries (Slides, Videos240p, 360p)

              Johannes Kinder, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland

11:30   Refreshments

12:00   Formal avenue for chasing metamorphic malware (Slides, Videos240p, 360p)

              Mila Dalla Preda (presented by Isabella Mastroeni), Dipartimento di Informatica, University of Verona, Italy

12:45   Sandwich lunch at the venue

13:45   Chasing Malware by Unveiling Program Interactions (Slides, Videos240p, 360p)

              Isabella Mastroeni, Dipartimento di Informatica, University of Verona, Italy

14:30   Refreshments

15:00   Research Institute in Automated Program Analysis and Verification

             GCHQ, UK

15:45   Discussion

16:00   Wrap up

16:15   Close

 

Photos:

 

 

 

 

 

This workshop is supported by the following sponsors:

 

Registered Attendees: +++This workshop is now full and registration has been closed+++


  1. Zirak Allaf, School of Computing, University of Portsmouth, UK 
  2. Tom Chothia, School of Computer Science, University of Birmingham, UK
  3. Mihai Christodorescu, Qualcomm Research Silicon Valley, USA
  4. David Clark, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  5. Mila Dalla Preda, Dipartimento di Informatica, University of Verona, Italy
  6. Alessandra Di Pierro, Dipartimento di Informatica, University of Verona, Italy
  7. Dino Distefano, Department of Computer Science at Queen Mary, University of London, UK
  8. Steve Dodier-Lazaro, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  9. Paolo Falcarin, Computing and Engineering (ACE) University of East London, UK
  10. Pooyan Farahani, Trinity Mirror Group Plc. and Imperial College London, UK
  11. Vida Ghanaei, Department of Informatics, King's College London, UK
  12. Prashant Gupta, McAfee Labs, UK
  13. Mark Harman, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  14. Syed Islam, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  15. Andy Jackson, UK Government, UK
  16. Yue Jia, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  17. Derek Jones, Knowledge Software, UK
  18. Mariam Kamkar, Department of Computer and Information Science, Linköping University, Sweden
  19. Wei-Ming Khoo, Computer Laboratory, University of Cambridge, UK
  20. Johannes Kinder, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
  21. Andy King, School of Computing, University of Kent, UK
  22. Jens Krinke, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  23. Daniel Kroening, Department of Computer Science, University of Oxford, UK
  24. Alexei Lisitsa, Department of Computer Science, University of Liverpool, UK 
  25. John Lyle, Department of Computer Science, University of Oxford, UK
  26. Sergio Maffeis, Department of Computing, Imperial College London, UK
  27. Isabella Mastroeni, Dipartimento di Informatica, University of Verona, Italy
  28. Rabih Mohsen, Department of Computing, Imperial College London, UK
  29. Granville Moore, Research Institute in Science of Cyber Security, UCL, UK
  30. Kaustubh Nimkar, PPLV Group, Department of Computer Science, UCL, UK
  31. Justyna Petke, CREST Centre, SSE Group, Department of Computer Science, UCL, UK
  32. Steven Poulson, Department of Computer Science and Information Systems, Birkbeck, University of London, UK
  33. Ed Robbins, School of Computing, University of Kent, UK
  34. Nahid Shahmehri, Department of Computer and Information Science, Linköping University, Sweden 
  35. Guangyan Song, Information Security Group, Department of Computer Science, UCL, UK
  36. Mark Vella, Department of Computer Science, University of Malta, Malta
  37. Herbert Wiklicky, Department of Computing, Imperial College London, UK
  38. Xiangjuan Yao, CREST Centre, UCL and College of Science, China University of Mining and Technology, China
  39. Faruque Sarker, ISD Application services team, UCL
  40. Nada Alruhaily, School of Computer Science,  University of Birmingham, UK

 

This page was last modified on 16 Aug 2017.