PROGRAM
Days: Friday, October 25th Saturday, October 26th
Friday, October 25th
View this program: with abstractssession overviewtalk overview
10:15-11:45 Session 1
10:15 | Describing Malware via Tagging (abstract) |
10:45 | CNN-Based Malware Visualization and Explainability (abstract) |
11:15 | ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships (abstract) |
13:00-14:30 Session 2
13:00 | Applying Deep Graph Representation Learning to the Malware Graph (abstract) |
13:30 | Applications of Graph Integration to Function Comparison and Malware Classification (abstract) |
14:00 | What is the Shape of an Executable? (abstract) |
15:00-17:00 Session 3
15:00 | Mitigating Adversarial Attacks against Machine Learning for Static Analysis (abstract) |
15:30 | Trying to Make Meterpreter into an Adversarial Example (abstract) |
16:00 | Towards a Trustworthy and Resilient Machine Learning Classifier - a Case Study of Ransomware Behavior Detector (abstract) |
16:30 | Exploring Backdoor Poisoning Attacks Against Malware Classifiers (abstract) |
Saturday, October 26th
View this program: with abstractssession overviewtalk overview
09:00-10:30 Session 5
09:00 | Accelerating The Alert Triage Scenario (AT-ATs): InfoSec Data Science with RAPIDS (abstract) |
10:00 | Scalable Infrastructure for Malware Labeling and Analysis (abstract) |
13:00-14:30 Session 6
13:00 | Learning to Rank Relevant Malware Strings Using Weak Supervision (abstract) |
13:30 | PowerShell Malware Detection using AMSI (abstract) |
14:00 | TweetSeeker: Extracting Adversary Methods from the Twitterverse (abstract) |
14:45-16:45 Session 7
14:45 | EMBER Improvements (abstract) |
15:15 | An Information Security Approach to Feature Engineering (abstract) |
15:45 | Next Generation Process Emulation with Binee (abstract) |
16:15 | Using Lexical Features for Malicious URL Detection- A Machine Learning Approach (abstract) |