anti Malware engineering WorkShop 2014 (MWS 2014)

[ MWS2008 | MWS2009 | MWS2010 | MWS2011 | MWS2012 | MWS2013 ]

MWS 2014

October 22 (Wed) - 24 (Fri), 2014
Sapporo Convention Center, Sapporo, Japan

Photo story of MWS 2014

Venue: Sapporo Convention Center

Award Ceremony

MWS2014 Best Paper Award:
Identifying of System Call Invoker by Branch Trace Facilities,
Yuto Otsuki, Eiji Takimoto (Ritsumeikan University), Shoichi Saito (Nagoya Institute of Technology) and Koichi Mouri (Ritsumeikan University)
MWS2014 Best Student Paper Award:
Use-After-Free Prevention Method using Memory Reuse Prohibited Library,
Yuta Ikegami and Toshihiro Yamauchi (Okayama University)
MWS2014 Best Student Paper Award:
Analyzing the inconsistency between words and actions of Android apps,
Takuya Watanabe (Waseda University), Mitsuaki Akiyama (NTT Secure Platform Laboratories), Tetsuya Sakai, Hironobu Washizaki and Tatsuya Mori (Waseda University)
MWS Cup 2014 Award Winner:
JINKAI-SENJUTSU Team,
Shin-ya Kobayashi, Hiroaki Matsuno (Shizuoka University), Yuuki Ishida, Shin-ichi Takeda (Tokyo University of Information Sciences), Akira Orita, Masaya Nakamura (Hitachi Systems, Ltd.,), Kazuya Kuwahara (Digital Arts Inc.), Naoto Kawaguchi (Japan Advanced Institute of Science and Technology), Ruiko Kuba, Kazumi Ishibuchi, Tetsuro Kito, Masashi Fujiwara (Hitachi, Ltd.), Masaki Hanada (Tokyo University of Information Sciences), Masakatsu Nishigaki (Shizuoka University), Hiroaki Kikuchi (Meiji University)
MWS Cup 2014 Award Winner with Technical Component:
Team UN,
Toru Iwano, Reika Samejima, Naohisa Nishida, Shota Mochizuki, Hayate Goto, Shin Sasaki, Kensuke Takahashi, Yuuki Tokushige (The University of Electro-Communications), Takayuki Watanabe, Tatsuya Ichida (NTT Communications), Yasuyuki Tanaka (NTT Com Security), Takanori Inazumi (NTT Communications)
MWS Cup 2014 Award Winner with Artistic Component:
Team "GOTO Love with m1z0r3",
Kazuki Aoki, Taiki Ikenishi, Shota Kozaki, Masaki Shimura, Kazuki Takahashi, Takanori Takebe, Yusuke Kubo, Takumi Sato, Kazuma Shinomiya, Yuya Nakayama, Bo Sun, Akira Saso, Takuya Watanabe, Yumehisa Haga, Toshiaki Harada, Yuta Ishii (Waseda University)

MWS Cup 2014

Briefing from MWS general chair, before the technical session
Commentary to the Preliminary Challenges from the authors (1)
Commentary to the Preliminary Challenges from the authors (2)
Commentary to the Preliminary Challenges from the authors (3)
Commentary to the Preliminary Challenges from the authors (4)
During the technical session (1)
During the technical session (2)
Presentation session (1)
Presentation session (2)
Group photograph

MWS 2014 Manuscripts and Slides

  • Symbols
    • "*" : presenter
    • "**" : student presenter

1A3: Countermeasure against Drive-by Download Attack (1) (session chair: Masaki Kamizono)

1A3-1: Searching URLs that have similar features to the existing malicious URLs

1A3-2: Visualization system for Drive-by-download traffic

1A3-3: Improving Coverage of Environment-dependent Code Using Program Slicing to Extract Potential URLs

1A3-4: A Study on Characteristics of PDF Files in Drive-by-Download Attacks

1A4: Countermeasure against Targeted Attack (1) (session chair: Mitsuhiro Hatada)

1A4-1: The method of grouping targeted attacks by considering the similarity of strings

1A4-2: A Method to Create Knowledge Base of Attackers' Intention Behind Malware Activities

1A4-3: Observing RAT server's behavior using its client GUI Part2

1A4-4: Proposal of Forensics Method Based on Communication Procedure of Process

2A1: Observation and Analysis of Network Attacks (session chair: Hiroaki Kikuchi)

2A1-1: Analysis of amplifier probing for reflector attacks

2A1-2: A study of stepping stone detection using active scan and observation of Darknet

2A1-3: Communication Analysis of Android Devices in the Darknet

2A1-4: Multimodal Analysis for Understanding Attack Activities of Embedded Devices

2A2: MWS Cup Presentation Session

2A3: Countermeasure against Drive-by Download Attack (2) (session chair: Makoto Iwamura)

2A3-1: An Approach to Detect Drive-by Download by Analyzing Web Link Structureswith Web Access Logs on the Framework for Counting Drive-By Download

2A3-2: Use-After-Free Prevention Method using Memory Reuse Prohibited Library

2A3-3: Detection of Drive-by Download Attacks Based on File Type Transition in Malware Infection Process

2A3-4: Study for the expansion of the detection range and the assessment of the effectiveness of cyber attack detection system in a real system

2B3: Static Malware Analysis (session chair: Koichi Mouri)

2B3-1: Analyzing the inconsistency between words and actions of Android apps

2B3-2: Malware Classification Robust against Compiler Modification

2B3-3: SECCON 2014 Summer On-line Qualifying CTF Participation Report

2A4: Security Technology Verification (session chair: Tatsuya Mori)

2A4-1: An Evaluation Method of Anti-virus Software on Capability of Behavior-based Malware Detection

2A4-2: Accuracy Evaluation of Detection Results of Security Appliance on Examining Reproduced Packets

2A4-3: Evaluation of malware detection algorithm by machine learning based on time-series data

2A4-4: Countermeasure Activities of Ministry of Internal Affairs and Communications against Malwares

2B4: Countermeasure against Targeted Attack (2) (session chair: Nasanobu Morinaga)

2B4-1: Proposal of virtualization isolation system to APT

2B4-2: Detection Method of Remote Access Trojan in an Early Stage

2B4-3: Proposal of a Detection Method of Malicious Process by Focusing on the Similarity of the States of the Hosts

2B4-4: A Simulative Deception Method against Targeted Attack Activities on Intranet

3A1: Malware Attack Detection (1) (session chair: Katsunari Yoshioka)

3A1-1: A Study for improvement of unknown malware's detection accuracy on Sandbox Analysis

3A1-2: An Experimental Result of Malware Detection using Statistical Techniques

3A1-3: Detecting Malware with Machine Learning Reloaded

3B1: Dynamic Malware Analysis (1) (session chair: Yoshihiro Oyama)

3B1-1: Proposal for Cryptographic Function Identification

3B1-2: Identifying of System Call Invoker by Branch Trace Facilities

3B1-3: Stealth malware analysis by using taint propagation on virtual machine monitor

3B1-4: Research on Attack Methods of Online Banking Malware Based on Static Analysis and Behavior Observation

3A2: Malware Attack Detection (2) (session chair: Takahiro Kasama)

3A2-1: Proposal of a method to detect the ROP attack code on the network

3A2-2: Design and Evaluation of a Profiling Method to Detect Post-infection Communications

3A2-3: Applying LPC Cepstrum analysis on malware infection detection

3A2-4: Efficient Implementation and Adaptive Processing Architecture of Sequence Operator

3B2: Dynamic Malware Analysis (2) (session chair: Kazufumi Aoki)

3B2-1: Proposal of Multimodal Malware Analysis System with Multiple Types of Sandboxes.

3B2-2: A Study on Dissimilarity Measure for Malware's Behaviors from Multiple Sandboxes

3B2-3: Proposal of Malware Dynamic Analysis in Real Android Device

3B2-4: A Proposal of Malware Sandbox Analysis Method for Safe Observation of Linux Malware

3A3: Dataset Collection and Analysis (session chair: Takahiro Matsuki)

3A3-1: Analysis of Malicious Domain Name Usage focused on DNS Name Resolution

3A3-2: A Study on Malware Selection Methodology for Evaluation based on Dynamic Analysis

3A3-3: Application of Deduplication to Malware Data

3A3-4: Feasibility Study of Research Data Set "Behavior Observable System 2014"

3B3: Dynamic Malware Analysis (3) (session chair: Hirofumi Nakakoji)

3B3-1: Supporting Malware Sandbox Analysis with MACIVISY (MAlware Communication Interactive VIsualization SYstem)

3B3-2: Malware Download Site Detection Based on Dependencies between Remote Servers and Malware Behavior

3B3-3: A Study on Visualization of Malware and Its Applications

3B3-4: Original Entry Point Detection by Classifying Dynamically Generated Instructions

Contact us

If you have any questions, please contact: csecreg at sdl.hitachi.co.jp

Published: 2014/06/05 20:00 Last Update: 2014/12/12 17:10

MWS 2014 Datasets provided by

CCC DATAset

IPA
JPCERT/CC
Telecom-ISAC Japan


NICTER Darknet Dataset

NICT


D3M

NTT


FFRI Dataset

FFRI, Inc.


PRACTICE Dataset

NTT Communications Corporation

Valid HTML 4.01 Strict
Valid CSS!