anti Malware engineering WorkShop 2013 (MWS 2013)

[ MWS2008 | MWS2009 | MWS2010 | MWS2011 | MWS2012 ]

MWS 2013

October 21st - 23rd, 2013,
Kagawa International Conference Hall and Sunport Hall Takamatsu, Kagawa, Japan.

Photo story of MWS 2013

These manuscripts have been published without reviewing and editing as received from the authors: posting the manuscript to MWS 2013 does not prevent future submissions to any journals or conferences with proceedings.

Venue: Kagawa International Conference Hall / Sunport Hall Takamatsu.

Award Ceremony

MWS2013 Best Paper Award:
Analysis of massive amount of API call logs collected from automated dynamic malware analysis systems,
Akinori Fujino and Tatsuya Mori (Waseda University).
MWS2013 Best Student Paper Award:
Observing RAT Server's Behavior Through Its Client GUI,
Yusuke Takahashi, Masaaki Kobayashi, Yuehting Chen, Kazuki Yonemochi, Katsunari Yoshioka and Tsutomu Matsumoto (Yokohama National University).
MWS Cup 2013 Award Winner:
Team "GOTO Love and SHODAI-MORI Lab",
Ryo Sato, Nobuhiro Nagai, Tatsuya Furuoka, Kazuki Takahashi, Takanori Takebe, Masaki Shimura, Akira Saso, Kento Takekoshi, Akinori Fujino (Waseda University).
MWS Cup 2013 Award Winner with Technical Component:
Team "JINKAI-SENJUTSU",
Shin-ya Kobayashi (Shizuoka University), Yusuke Inoue (Tokyo University of Science), Noriyuki Takahashi, Kazuya Kuwahara (Digital Arts Inc.), Kazumi Ishibuchi, Masashi Fujiwara (HIRT, Hitachi, Ltd.), Hiroaki Kikuchi (Meiji University).
MWS Cup 2013 Award Winner with Artistic Component:
Team "Enu",
Asuka Nakajima, Yuta Takata, Daiki Chiba, Yang Zhong, Takafumi Harada (NTT Secure Platform Laboratories).
MWS Cup 2013 FFRI Special Award Winner:
Team "GOTO Love and SHODAI-MORI Lab",
Ryo Sato, Nobuhiro Nagai, Tatsuya Furuoka, Kazuki Takahashi, Takanori Takebe, Masaki Shimura, Akira Saso, Kento Takekoshi, Akinori Fujino (Waseda University).
MWS Cup 2013 TrendMicro Special Award Winner:
Team "SecCap Cheerful Fellows",
Yuta Onogi, Yoshihiro Ryugo, Hirotaka Fujiwara, Wataru Tsuda, Yasuyuki Kobayashi, Naoya Sawada (Nara Institute of Science and Technology), Yuji Manaka (Osaka University), Koki Nagatani, Soichiro Oki, Kozue Nojiri, Hiroaki Horigome (Keio University),
 and 
Team "GANBARIMASU".

MWS Cup 2013

Briefing from MWS general chair, before the technical session.
Commentary to the Preliminary Challenges from the authors (1).
Commentary to the Preliminary Challenges from the authors (2).
During the technical session.
Presentation session.

YouTube: MWS Cup 2013 highlights

MWS 2013 Manuscripts and Slides

  • Symbols
    • "*" : presenter
    • "**" : student presenter
  • All of manuscripts and slides here are in Japanese, except for attached English titles and abstracts.

1A1: Special Session + Countermeasure against Information Leakage (session chair: Mitsuhiro Hatada)

1A1-1: Datasets for Anti-Malware Research —MWS Datasets 2013—

[ Manuscript (PDF) | Slide (PDF) ]

1A1-2: Special Talk

1A1-3: Sanitizing Sensitive Contents from Document Malware for Accelerating Sample Sharing

1A1-4: Proposal of Attacker Investigation System Triggered Information Leakage

[ Manuscript (PDF) | Slide (PDF) ]

1A2: Illegal Communication (1) (session chair: Haruki Takeda, Masaki Kamizono)

1A2-1: A Study of Characteristic of Malignant Communication as Seen from the Packet Capture Data

1A2-2: Development of an Incident Analysis Method for Network Logs of Industrial Control System

1A2-3: Extracting Malicious Website from DNS Log —Analysis Method and Anonymity—

1A2-4: Search Approach of a Herder and Infected Computers Using IRC Protocol

2A1: Illegal Communication (2) (session chair: Tatsuya Mori)

2A1-1: Detection of Suspicious HTTP Communication Based on Cookie Insertion by HTTP Proxy

2A1-2: Tolerant Transparent Probabilistic Packet Marking System Using RSTP

2A1-3: Implementation of The System for Preventing Access to Malicious Web Site by Using Faked DNS Query Response

[ Slide (PDF) ]

2A1-4: Observing RAT Server's Behavior Through Its Client GUI

2B1: Log Analysis (session chair: Takahiro Kasama)

2B1-1: Cyber Attack Detection System Using a Communication Log of the Enterprise Network

[ Slide (PDF) ]

2B1-2: Examination of Long Term IDS Log Analysis by Wavelet Transform

2B1-3: Detection of Novel-Type Brute Force Attacks Used Expendable Springboard IPs as Camouflage

2B1-4: A Log Analysis of IDS Alert Events Using Holt-Winters Method

2A2: Illegal Communication (3) (session chair: Katsunari Yoshioka)

2A2-1: Analysis of Botnets Using Malware Infection Attacks on Websites

2A2-2: A Study on the Effectiveness of Black List Use Based on Long-Term Observations of Malignant Site Domain

[ Manuscript (PDF) | Slide (PDF) ]

2A2-3: A Study on Light-Weight URL Blacklist Generation Based on Sandbox Analysis

[ Manuscript (PDF) | Slide (PDF) ]

2B2: Honeypot (session chair: Koichi Mouri)

2B2-1: Network Monitoring Method with Dynamic Honeypots for Unconnected IP Addresses

2B2-2: Multi-Environment Analysis for Detecting Malicious Web Sites Changing Their Behavior

2B2-3: A Study of the Dynamic Internet Threat Monitoring for Preventing Localization Attacks to Each Sensor

2B2-4: A Study of Malicious Traffic Analysis to Honeypots in a Darknet

2A3: MWS Cup Presentation Session

3A1: Illegal Communication (4) (session chair: Takurou Hosoi)

3A1-1: Detection of Drive-by-Download Attack Using Qualitative Characteristics and Transitions

[ Slide (PDF) ]

3A1-2: Drive-by-Download Attack Detection Based on Characteristics of Exploit Kit

3A1-3: A Study of the Detection Method Based on Trend Analysis of Falsificated Web Site

3A1-4: Analysis of Massive Amount of API Call Logs Collected from Automated Dynamic Malware Analysis Systems

[ Manuscript (PDF) | Slide (PDF) ]

3B1: Endpoint (1) (session chair: Kazuki Iwamoto)

3B1-1: Applying Data Management Infrastructure to Malware Analysis

[ Manuscript (PDF) | Slide (PDF) ]

3B1-2: Proposal of a Method Detecting Malicious Process

3B1-3: Evaluation of Methods to Detect Malicious MS Document File Using File Structure Inspection

[ Manuscript (PDF) | Slide (PDF) ]

3B1-4: Methods to Detect Malicious PDF File Using PDF Structure Inspection

[ Manuscript (PDF) | Slide (PDF) ]

3A2: Illegal Communication (5) (session chair: Norihiko Maeda)

3A2-1: Geographical Classification of Malicious Packets Using Self-Organization Map

3A2-2: A Study on Vulnerability Inspection of Internet Subnets by Darknet Traffic Data Analysis

[ Manuscript (PDF) | Slide (PDF) ]

3A2-3: Darknet Traffic Analysis by Using Source Host Classification

[ Manuscript (PDF) | Slide (PDF) ]

3A2-4: Realtime Detection Method to Malicious Traffic in Livenet

3B2: Endpoint (2) (session chair: Takahiro Matsuki)

3B2-1: Identifying the Contents of Malware Communication Using Data Dependency Between API Calls

3B2-2: A Method for Identifying System Call Invoker in Dynamic Link Library

3B2-3: Network Control of Multiple Sandboxes Corresponding to Port Listening States of Malware

3B2-4: SaaR: Sandbox as a Request

3A3: Illegal Communication (6) + Modeling (session chair: Satoru Torii)

3A3-1: A Malware Damage Analysis Based on Modeling Data of Local Network in an Organization and Malwares

3A3-2: Time Series Analysis of Malware Using NONSTOP Data

3A3-3: An Analysis of Endemic Threshold and Steady State for Multi-Virus Propagation Model for Multi Devices

3A3-4: Proposal of P2P Network Filter Sharing Method in Clustering Using Virtual Peers

3B3: Endpoint (3) (session chair: Kenji Aiko, Makoto Iwamura)

3B3-1: Improving Accuracy of Malware Detection by Filtering Evaluation Dataset Based on Its Similarity

3B3-2: Identification of Subspecific Malware by Utilizing Kullback-Leibler Divergences

[ Manuscript (PDF) | Slide (PDF) ]

3B3-3: Compiler and Optimization Level Estimation for Improving Anti-Malware Technologies

3A4: DoS (session chair: Masahiko Kato)

3A4-1: Effectiveness of a Change in TCP Retransmission Timer Management for Low-Rate DoS Attack Mitigation

[ Manuscript (PDF) | Slide (PDF) ]

3A4-2: An Investigation on Kolmogorov Complexity Targeting Using It as a Measure to Detect DoS Attack

3A4-3: DNS Traffic Analysis by Darknet Monitoring

Contact us

If you have any questions, please contact: csecreg at sdl.hitachi.co.jp

Published: 2013/08/29 22:00 Last Update: 2014/09/03 16:00

MWS 2013 Datasets provided by

CCC DATAset

IPA
JPCERT/CC
Telecom-ISAC Japan


nicter darknet

NICT


D3M

NTT


FFRI dataset

FFRI, Inc.


PRACTICE

NTT Communications Corporation

Sponsors

Hitachi Incident Response Team
ComWorth Co., Ltd.
Trend Micro Incorporated.
FFRI, Inc.
Yokohama Research Laboratory, Hitachi, Ltd.
McAfee Co., Ltd.

Valid HTML 4.01 Strict
Valid CSS!