| |||||||||
LEET 2013 : 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats | |||||||||
Link: https://www.usenix.org/conferences/byname/168 | |||||||||
| |||||||||
Call For Papers | |||||||||
Now in its fourth year, LEET continues to be a unique and leading forum for the discussion of threats to the confidentiality of our data, the integrity of digital transactions, and the dependability of the technologies we increasingly rely upon. We encourage submissions of papers that focus on the malicious activities themselves (e.g., reconnaissance, exploitation, privilege escalation, rootkit installation, attack), our responses as defenders (e.g., prevention, detection, and mitigation), or the social, political, and economic goals driving these malicious activities and the legal and ethical codes guiding our defensive responses. Topics of interest include but are not limited to:
Infection vectors for malware (worms, viruses, etc.) Botnets, command and control channels Spyware Operational experience and case studies Forensics Click fraud Measurement studies New threats and related challenges Boutique and targeted malware Phishing Spam Underground economy Miscreant counterintelligence Carding and identity theft Denial-of-service attacks Hardware vulnerabilities Legal issues The arms race (rootkits, anti–anti-virus, etc.) New platforms (cellular networks, wireless networks, mobile devices) Camouflage and detection Reverse engineering Vulnerability markets and zero-day economics Online money laundering Understanding the enemy Data collection challenges |
|