anti Malware engineering WorkShop 2017 (MWS2017)

MWS 2017

October 23 (Mon) - 25 (Wed), 2017
Yamagata Kokusai Hotel, Yamagata, Japan

Photo story of MWS2017 / MWS Cup 2017

Venue

Award Ceremony

MWS2017 Best Paper Award:
(Japanese version only)
Hiroyuki Uekawa (Graduate School of Natural Science and Technology, Okayama University)
Toshihiro Yamauchi (Graduate School of Natural Science and Technology, Okayama University)
MWS2017 Student Paper Award:
"Understanding the Vulnerability Responses by Mobile App Developers"
Tatsuhiko Yasumatsu (Waseda University)
Fumihiro Kanei (NTT Secure Platform Laboratories)
Takuya Watanabe (NTT Secure Platform Laboratories)
Eitaro Shioji (NTT Secure Platform Laboratories)
Mitsuaki Akiyama (NTT Secure Platform Laboratories)
Tatsuya Mori (Waseda University)
MWS2017 Best Practical Research Award:
"STARDUST: Large-Scale Infrastructure for Luring Cyber Adversaries"
Yu Tsuda (National Institute of Information and Communications Technology)
Takashi Tomine (National Institute of Information and Communications Technology)
Nobuyuki Kanaya (National Institute of Information and Communications Technology)
Daisuke Makita (National Institute of Information and Communications Technology)
Hayato Ushimaru (National Institute of Information and Communications Technology)
Masato Jingu (National Institute of Information and Communications Technology)
Yuuki Takano (National Institute of Information and Communications Technology)
Shingo Yasuda (National Institute of Information and Communications Technology)
Ryosuke Miura (National Institute of Information and Communications Technology)
Satoshi Ohta (National Institute of Information and Communications Technology)
Toshiyuki Miyachi (National Institute of Information and Communications Technology)
Masaki Kamizono (National Institute of Information and Communications Technology)
Masashi Eto (National Institute of Information and Communications Technology)
Daisuke Inoue (National Institute of Information and Communications Technology)
Koji Nakao (National Institute of Information and Communications Technology)
MWS Cup 2017 First Place Winner:
Team UN

Total Score: 61.7
Preliminary Challenge Score : 17.7 (9th place/14 teams)
On-site Challenge Score : 44 (1st place/14 teams)
MWS Cup 2017 Second Place Winner:
JINKAI-SENJUTSU White Team

Total Score: 60.4
Preliminary Challenge Score : 21.4 (1st place/14 teams)
On-site Challenge Score : 39 (3rd place/14 teams)
MWS Cup 2017 Third Place Winner:
Security SANKA

Total Score: 60.0
Preliminary Challenge Score : 18.0 (7th place/14 teams)
On-site Challenge Score : 42 (2nd place/14 teams)

Special Session (Session 1A4)

1A4-1: Briefing of This Special Session
Takahiro Kasama (NICT/MWS2017 Executive Committee Chair)
Yuka Higashi (Trend Micro Incorporated/MWS2017 Executive Committee)
MWS2017 Program Editing Report
Toshihiro Yamauchi (Okayama University/MWS2017 Program Committee Chair)
(No Image) 1A4-3: Panel Discussion "MWS Connecting to The Next Generation"
Masato Terada (Hitachi Ltd.)
Mitsuhiro Hatada (NTT Communications Corporation)
Yoichi Shinoda (Japan Advanced Institute of Science and Technology)
Takahiro Kasama (NICT/MWS2017 Executive Committee Chair)
Yuka Higashi (Trend Micro Incorporated)
Yuta Takata (NTT Secure Platform Laboratories)
Masaya Sato (Okayama University)
(No Image)
1A4-4: Research Ethics/Responsible Disclosure
Mitsuaki Akiyama (NTT Secure Platform Laboratories)

MWS Cup 2017

Competitors in the technical session.
Commentary on the Challenges in the technical session.
MWS Cup Presentation Session (1A3):
a presentation on the Preliminary Challenge.
Evaluation of presentations.
group photo 1.
group photo 2.

MWS 2017 Research Presentations

  • Symbols
    • * : presenter
    • ** : student presenter

1B3: Attack Detection (1) (session chair: Tatsuya Mori)

1B3-1: A Detailed Examination of Cyber Attack Detection Method Using Attack Scenarios

1B3-2: Detections of Attacker's Behavior Using Graph Classification Based on Tensor Decomposition

1B3-3: Detection Method What Suspicious Email is Based on Email Context

1B3-4: Evaluation of Hybrid Intrusion Detection Method Combined with Random Forest and K-Means

2A1: Dynamic Analysis (1) (session chair: Yoshihiro Oyama)

2A1-1: Survey Analysis of Anti Virtual Machine Functions in Malicious Software

2A1-2: Development of Dynamic Analysis Tool that Avoid of Anti Virtual Machine Function on Malicious Software

2A1-3: Easy Implementation of Bare-Metal Sandbox with Commercial System Recovery Software

2A1-4: Sandbox: Proposal of Bootable System Snapshot for Physical Machine.

2B1: Web Attack Analysis (session chair: Mamoru Mimura)

2B1-1: (Japanese version only)

2B1-2: (Japanese version only)

2B1-3: (Japanese version only)

2B1-4: A Study on Classification of Malicious JavaScript Based on Source Code Similarity

2A2: Dynamic Analysis (2) (session chair: Atsuo Inomata)

2A2-1: STARDUST: Large-Scale Infrastructure for Luring Cyber Adversaries

2A2-2: Preserving Tool for Process Behavior Using Kernel Mode Device Driver

2A2-3: A Method of Shortening Sleep Duration in Dynamic Malware Analysis

2A2-4: Implementation of Stack Trace on Windows 10 x64 Using Virtual Machine Monitor

2B2: Threat Analysis / Dataset (session chair: Ayumu Kubota)

2B2-1: Investigation of Cyber Threat Analysis Method Using OSINT and Deep Reinforcement Learning

2B2-2: Proposal of a Framework to Share Information on Cyberattack and Countermeasures among Multiple Organizations and within a Company Effective to Reduce Damage

2B2-3: Evaluation of Multiple WannaCry Reports from Various Organizations

2B2-4: Overview of Research Data Set "Behavior Observable System 2017"

2A3: Malware Analysis (session chair: Hiroki Hada)

2A3-1: Analysis of Ransomware Characteristics for Detection

2A3-2: A Study on Steganography for Malware

2A3-3: Taint-Assisted Forensics for IAT Reconstruction

2A3-4: A Study for Malware Similarity Evaluation Method by Structural Entropy

2B3: Vulnerability and Security Evaluation (session chair: Masayuki Okada)

2B3-1: Understanding the Vulnerability Responses by Mobile App Developers

2B3-2: Proposal on Test Platform for Efficient Penetration Testing

2B3-3: Study on Automating a Penetration Test Based on an Attack State Transition

2B3-4: Security Evaluation of Memory Access Pattern Protection against Active Adversaries

2A4: IoT / System Security (session chair: Takeshi Okamoto)

2A4-1 A Method to Find IoT Devices Based on Image Features of Their WebUI

2A4-2: Analysis of Factors for Persistent Infection of IoT Malware and Their Substantiation Using Real Devices

2A4-3: (Japanese version only)

2A4-4: Reduction of Arbitrary Code Execution Resources by Deleting Unnecessary Execution Binary Code

2B4: Attack Detection (2) (session chair: Daisuke Makita)

2B4-1: Evaluation of Detection Items against Drive-By-Download Attacks

2B4-2: Proposal to Support Analysis of Drive-by Download Attack by Highlighting Malicious URL

2B4-3: Discovering New Type of Network Scan in Early Stage by Change-Point Detection

2B4-4: Proposal of an Enhancement Technique for Detection Systems

3A1: Malware Detection / Data Analysis (session chair: Nobuyuki Kanaya)

3A1-1: Malware Detection Method Based on API Call Patterns, Elapsed Time and System Load between API Calls

3A1-2: Research on Detection of Unknown Malware Focusing on Registry Change

3A1-3: A Malicious Code Extraction Method for PDF Files Based on DBI

3A1-4: Detecting Mimikatz by Sysmon

3B1: Incident Response (session chair: Masaki Kamizono)

3B1-1: Automated System for Information Sharing and Incident Response with SDN and STIX

3B1-2: Minimum Requirements of CSIRT

3B1-3: A Case Study of Effective Cyberattack-Exercises for Leading Infrastructure Providers

3B1-4: (Japanese version only)

3A2: Malware Classification (session chair: Takahiro Matsuki)

3A2-1: Malware Type Classification Method Based on Network Communication Behavior

3A2-2: Malware Classification Based on Data Compression Algorithm

3A2-3: Proposal of Method for Malware Classification Using Malware Analysis Report of Multiple Analysis Environment

3A2-4: Detecting Android PUAs and Classifying Its Variants with Analysis of DNS Queries

3B2: Web Security (session chair: Yoshinori Takesako)

3B2-1: Classification Method of Unknown Websites Based on Distribution Information of Malicious IP Addresses

3B2-2: A Study on URL of Malicious Websites Built by Exploit Kit

3B2-3: Study on Combination of Features in Browser Fingerprinting

3B2-4: An Efficient Method to Extract Malicious Websites from Massive End-User Access Log

3A3: Malware and AI / Machine Learning (1) (session chair: Tomohiro Shigemoto)

3A3-1: Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?

3A3-2: Intuitive Binary Classification and Visualization with Machine Learning

3A3-3: Semi-Supervised Machine Learning Approach for Detecting Malware Infected Host by Analyzing HTTP Traffic

3A3-4: (Japanese version only)

3B3: Network Observation Technology (1) (session chair: Takashi Koide)

3B3-1: Proposal and Evaluation for a Classification Method of Cyber Attack Programs in the Initial Stage

3B3-2: (Japanese version only)

3B3-3: An Evaluation on Reduction of Traffic Amount and Influence by Network Patrol Monitoring

3B3-4: Association Rule Analysis for Darknet Traffic Data

3A4: Malware and AI / Machine Learning (2) (session chair: Satomi Saito)

3A4-1: Applied Online Learning with Kernel for Intrusion Detection System

3A4-2: (Japanese version only)

3A4-3: Malicious Process Estimation Method Using Seq2Seq Model

3B4: Network Observation Technology (2) (session chair: Kousetsu Kayama)

3B4-1: (Japanese version only)

3B4-2: Prediction of Malicious Access by Event Dependent Model

3B4-3: Investigation of Long-Term Attacker Host's Behaviour with IP Address Attribution

3B4-4: Leaving All Proxy Server Logs to Pragraph Vector

TOP
Japanese

Sponsors

Supporters