SIG SIDAR Conference on
Detection of Intrusions and Malware &
Vulnerability Assessment

DIMVA 2006

July 13-14, 2006
Berlin, Germany


DIMVA2005 Conference of SIG SIDAR
of the German Society of Informatics (GI).

In Cooperation with IEEE Task Force on Information Assurance.

Supported by ENISA.
DIMVA2007

Submission GuidelinesCall for Papers: Text or PDF
Committees
Information Travel and HotelConference Program: HTML or PDF Online Registration
Satellite Events Related Events
DIMVA in Press

Program:

13.07.2006
8:30-9:30
Registration
9:30-9:45
Opening remarks
9:45-11:00  Keynote: J. McHugh, Dalhousie University
Reaction: The Internet security paradox.
11:00-11:30
Coffee break
11:30-12:30  Code Analysis
Using Type qualifiers to analyze untrusted integers and detecting security flaws in C programs.
Ebrima N. Ceesay, Jingmin Zhou, Matt Bishop, Michael Gertz and Karl Levitt
Using static program analysis to aid intrusion detection.
Manuel Egele, Martin Szydlowski, Engin Kirda and Christopher Kruegel
12:30-14:00
Lunch break
14:00-15:30  Intrusion Detection
An SVM-based masquerade detection method with online update using co-occurrence matrix.
Liangwen Chen and Masayoshi Aritsugi
Network-level polymorphic shellcode detection using emulation.
Michalis Polychronakis, Kostas G. Anagnostakis and Evangelos P. Markatos
Detecting unknown network attacks using language models.
Konrad Rieck and Pavel Laskov
15:30-16:00
Coffee break
16:00-17:00  Threat Protection and Response
Using labeling to prevent cross-service attacks against smart phones.
Collin Mulliner, Giovanni Vigna, David Dagon and Wenke Lee
Using contextual security policies for threat response.
Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens and Frédéric Cuppens
17:15-18:00
Meeting of the GI Special Interest Group SIDAR
19:00-23:00
Boat trip on the Spree / Conference dinner and dinner address by Stefan Grosse, Federal Ministry of the Interior


14.07.2006
9:00 Start
9:00-10:15  Keynote: M. Behringer, Cisco Systems
Security Management: 5000 events/sec, half an engineer and automation discouraged.
10:15-10:45
Coffee break
10:45-11:45  Malware and Forensic
Detecting self-mutating malware using control-flow graph matching.
Danilo Bruschi, Lorenzo Martignoni and Mattia Monga
Digital forensic reconstruction and the virtual security testbed ViSe.
André Årnes, Paul Haas, Giovanni Vigna and Richard A. Kemmerer
11:45-12:30
Rump session
12:30-14:00
Lunch break
14:00-15:00  Deployment Scenarios
A robust SNMP-based infrastructure for intrusion detection and response in tactical MANETs.
Marko Jahnke, Sascha Lettgen, Jens Tölle, Michael Bussmann and Uwe Weddige
A fast worm scan detection tool for VPN congestion avoidance.
Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi and Bernhard Plattner
15:00-15:30
Coffee break
16:00 End
15:30-16:30  Best Practice
Analysing privacy-invasive software using computer forensic methods.
Martin Boldt and Bengt Carlsson
Subverting J2EE security with malicious serialized payload.
Marc Schönefeld
16:30-17:00
Overview and results of the 2nd Capture-The-Flag contest CIPHER
Lexi Pimenidis
17:00-17:15
Concluding remarks

DIMVA
Banner

Imprint /Impressum