WoRMA '22: 1st Workshop on Robust Malware Analysis

Fabio Pierazzi, Nedim Srndic

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Malware is a term used for computer software created for malicious purposes. The rise of malware has closely followed the rise of computers in the society, and in∼2022 it represents a ubiquitous threat in the digital world, impacting individuals, organizations and governments. As a reaction to the emergence of malware, the new research direction malware analysis was established. Unlike most other domains of computer science, malware analysis operates in an actively adversarial environment, where the potential reward for attackers is very high, and their maneuvering space is ample. Under such conditions, an arms race has arisen between attackers and defenders. A crucial condition necessary to prevail in this race is the research of robust methods and solutions. The goal of this workshop is to bring together leading researchers in the field in a joint forum for advancing the robustness of malware analysis.

Original languageEnglish
Title of host publicationASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery, Inc
Pages1271-1272
Number of pages2
ISBN (Electronic)9781450391405
DOIs
Publication statusPublished - 30 May 2022
Event17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022 - Virtual, Online, Japan
Duration: 30 May 20223 Jun 2022

Publication series

NameASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security

Conference

Conference17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022
Country/TerritoryJapan
CityVirtual, Online
Period30/05/20223/06/2022

Keywords

  • adversarial machine learning
  • malware
  • malware analysis
  • malware attribution
  • malware detection

Fingerprint

Dive into the research topics of 'WoRMA '22: 1st Workshop on Robust Malware Analysis'. Together they form a unique fingerprint.

Cite this