3rd Cyber Security Workshop in the Netherlands (Kopie)

3rd Cyber Security Workshop in the Netherlands (Kopie)

05 October 2017

11:30-12:45

Registration & Lunch

12:45-13:00

Introduction / Opening

13:00-14:00

Keynote by Dr. Luca Allodi ( Eindhoven University of Technology)

Title: 'Tales from the Russian Underground: Infection Technologies and Economics’.

Abstract:
Cybercrime markets support the development and diffusion of new attack
technologies, vulnerability exploits, and malware. Whereas the revenue
streams of cyber attackers have been studied multiple times in the
literature, the economic aspects that enable and foster attack trading
have not been fully characterised yet: a few studies evaluated the
trading economics of illegal products such as drugs, weapons, and
pornography, yet no account currently exists on the underground
provision of cyber-attacks.
Importantly, the link between the emergence of an ‘exploit economy’
and the final risk of attack is only theorised, whereas a clear
quantification of this link is still entirely missing.

In this talk we provide a first empirical characterisation of these
aspects by infiltrating a prominent Russian cybercrime market, and
investigate market regulation, traded products, prices, and quantify
the relation between market activities and the realisation of an
attack in the wild.

The discussion will focus on market dynamics, exploit economics and
infection mechanisms, as well as on identifying future research venues
and open problems for the research community to address.

14:00-15:30

Poster Session + Coffee & Speeddates

15:30-17:00

Selected Talks & Discussion

(1) Victor van der Veen (VU Amsterdam) et al.; The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later; published at ACM CCS 2017 (among top security conferences)

(2) Riccardo Bortolameotti (UTwente) et al.; DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting; published at ACSAC 2017 (among top security conferences)

(3) Laura Genga (TU/e) et al.; Discovering and Analyzing Anomalous Patterns From Event Logs

17:00-18:00

Award Ceremony & Networking drinks