Itzik Kotler | 23 Aug 10:28 2012

Automated Static Malware Analysis with Pythonect

Hi All,

I wanted to share with you a post I wrote about how to automate static
malware analysis with Pythonect:

Pythonect is a new, experimental, general-purpose dataflow programming
language based on Python.

In this post I explain the benefits of using dataflow programming in
research and analysis of malware.

Additionally I have provided some examples: computing MD5 and SHA1
digests, searching for all the INT 3 instructions occurrences, and
Shannon's entropy calculation.

I'd appreciate any feedback you can give me on the content.

Itzik Kotler |

This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier 
technical event for ICT security experts. Featuring 30 hands-on training 
courses and 90 Briefings presentations with lots of new content and new 
tools.  Network with 4,000 delegates from 70 nations.  Visit product 
displays by 30 top sponsors in a relaxed setting.  
(Continue reading)

Teóphilo Athos Brauns | 24 Jan 01:32 2012

Cyber Warfare / Network Defense Simulation


I would like to ask if you guys have any suggestions (including
articles, references, books, sites, ideas, anything) on how to build a
"Poor man's Cyber Warfare / Network Defense Simulation" for:

1 - study
2 - forensic analysis
3 - vulnerabilities replication
4 - worm/virus spreading
5 - DLP (data leak/loss prevention) study

For my first attempts I used a dual-quad xeon server with 32GB ram and
managed to create a whole network with ids/ips, firewall,
workstations, attackers, database, log collecting using linux
containers (lxc).

Thank you all

Teophilo Athos Brauns
Security Enthusiast

Teóphilo Athos Brauns | 24 Jan 12:45 2012

Cyber Warfare / Network Defense Simulation


I would like to ask if you guys have any suggestions (including
articles, references, books, sites, ideas, anything) on how to build a
"Poor man's Cyber Warfare / Network Defense Simulation" for:

1 - study
2 - forensic analysis
3 - vulnerabilities replication
4 - worm/virus spreading
5 - DLP (data leak/loss prevention) study
6 - ???

For my first attempts I used a dual-quad xeon server with 32GB ram and
managed to create a whole network with ids/ips, firewall,
workstations, attackers, database, log collecting using linux
containers (lxc).

Thank you all

Teophilo Athos Brauns
Security Enthusiast

Dragos Ruiu | 2 Dec 03:27 2011

CanSecWest 2012 Mar 7-9; 2nd call for papers, closes next week, Monday. Dec 5 2011

So after a dozen years or so organizing conferences, you 
get the urge to pull levers and try experimenting with 
things. So this year I sent out the CanSecWest CFP 
only over Twitter, and G+ publicly. Just curious as to the 
adoption and information dispersion rate, and some 
estimate of the attention these newer channels are getting.

So after this experiment I hear about people having 
submissions and missing  the CFP. So for my control set, 
here is the normal announce message to different e-mail 
lists. We'll do a Second CanSecWest CFP, but a brief one. 
Send us your proposal by the end of Monday next week, 
December 5, 2011.

The questions and information needed is the same as 
usual (see website), also for my curiosity could you 

12. Where did you hear about the CFP from?



World Emerging Security Technology
Vancouver, March 7-9
pgpkey kyxpgp

Guofei Gu | 24 Aug 16:59 2011

CFP: Special Issue of COMPUTER NETWORS (ELSEVIER) on 'Botnet Activity: Analysis, Detection and Shutdown'

CFP: Special Issue of COMPUTER NETWORS (ELSEVIER) on "Botnet Activity: Analysis, Detection and Shutdown"

Apologies for multiple copies of this announcement.

Dear Colleagues,

Please consider the following opportunity to submit and publish original
scientific results to a SPECIAL ISSUE of COMPUTER NETWORKS
(ELSEVIER journal) on "Botnet Activity: Analysis, Detection and Shutdown".

The submission deadline is set to December 1st, 2011.

A pdf version of this CFP is available at
Please help distribute. Thanks!


Large scale attacks and criminal activities experienced in recent
years have exposed the Internet to serious security breaches, and
alarmed the world regarding cyber crime. In the center of this problem
are the so called botnets -- collections of infected zombie machines
(bots) controlled by the botmaster to perpetrate malicious activities
and massive attacks. Some recent botnets are composed of millions of
infected machines, making use of this attack vector inevitably
harmfully. Hence, it is paramount to detect, analyze and shutdown such
overlay networks before they become active. Research on botnet
activity is mostly related to detection and disruption.
(Continue reading)

RAID 2011 | 26 Jul 00:29 2011

[RAID 2011] Call for Participation

Apologies for multiple copies of this announcement.

14th International Symposium on Recent Advances in Intrusion Detection (RAID'2011)

September 20-21, 2011
SRI International, Menlo Park, CA

Call for Participation


For the fourteenth year, the intrusion detection community will
converge at RAID'2011 to discuss cutting-edge research in malware,
application security, anomaly detection, special environments
and sandboxing, web security and social networks, and network 
security. You are invited to join us at RAID for two days
this September at SRI International, Menlo Park, CA.

Register online at:
Kind reminder: early bird registration closes on August 1, 2011!

The annual symposium brings together leading researchers and
practitioners from academia, government, and industry to discuss
issues and technologies related to intrusion detection and

RAID 2011 features an exciting technical program, with
presentations addressing topics such as dynamic analysis of malicious
shellcode, world's fastest taint tracker, anomaly detection using
software defined networking, defending legacy embeded systems,
web and social network security, and cross-analysis of botnet victims.
A poster session during the symposium will provide lively
face-to-face discussions of work in progress.

This year we will have a great keynote presentation on "The
Cutting Edge of Medical Device Security and Privacy" by Dr. Kevin Fu!

We also have a special panel to discuss "State and Future of
Open-Source Network Intrusion Detection":
 Panel Moderator:
  - Ron Gula, Tenable Network Security
 Panel participants:
  - Seth Hall, International Computer Science Insitute
  - Victor Julien, Open Infosec Foundation
  - Martin Roesch, Sourcefire

The Open Information Security Foundation (OISF) is co-locating
a Suricata community meeting with RAID 2011.

Don't miss out this great fun event to socialize with your
colleagues at the heart of silicon valley!

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -
Hafez Kamal | 8 Jun 05:48 2011

[HITB-Announce] HITB2011AMS Conference Materials & Photos

Hi everyone and greetings from Netherlands!

We're finally done with the epicness that was HITB2011AMS! Over 300
attendees and 45 speakers joined us for 2 days of trainings and a 2 day
quad-track conference and it was a blast as always!

Presentation materials can be downloaded from:

In addition, photos from the event have also been uploaded to a gallery
on HITBSecPhotos:

The Call for Papers (CFP) for HITB2011KUL (October 10th - 13th  <at> 
Intercontinental Kuala Lumpur, Malaysia) is still open and submissions
are due before the 15th of July:


On a somewhat related note, we've also recently migrated our old news portal to a new home - HITBSecNews running at and also launched a new landing page at the old URL.

We know a fair number of folks have been asking about the next issue of
the HITB quarterly magazine ( and we're happy
to announce that Issue 006 will be out this week (in < 48 hours to be

As always we'll let everyone here know when the magazine is available
for download or you could also follow our  <at> hackinthebox Twitter stream
where we'll post the links as well.

Hafez Kamal
Hack in The Box (M) Sdn. Bhd.
Suite 26.3, Level 26, Menara IMC,
No. 8 Jalan Sultan Ismail,
50250 Kuala Lumpur,

Tel: +603-20394724
Fax: +603-20318359

Picon 2011 CFP

Call for Papers 2011

The purpose  of the convention  is to give  an open  and free
playground   where  people   can  discuss   the  implication   of  new
technologies in  society. is a balanced  mix convention where
technical  and non-technical  people can  meet each  others  and share
freely all  kind of information.  The  convention will be  held in the
Grand-Duchy of  Luxembourg in September (19-21.09.2011).  The most
significant  new  discoveries   about  computer  network  attacks  and
defenses,  commercial  security solutions,  and  pragmatic real  world
security  experience will  be  presented  in a  three  days series  of
informative tutorials.   We would like to announce  the opportunity to
submit papers,  and/or lightning talk  proposals for selection  by the  technical  review  committee.  This  year we  will  be  doing
workshops on the first  day PM and talks of 1 hour  or  30 minutes  in
the main track for the two following days.

A capture the flag contest will take place during the whole conference.

Scope ======

Topics of interest include, but are not limited to:

  * Software Engineering and Security
  * Honeypots/Honeynets
  * Spyware, Phishing and Botnets (Distributed attacks)
  * Newly discovered vulnerabilities in software and hardware
  * Electronic/Digital Privacy
  * Wireless Network and Security
  * Attacks on Information Systems and/or Digital Information Storage
  * Electronic Voting
  * Free Software and Security
  * Assessment of Computer, Electronic Devices and Information Systems
  * Standards for Information Security
  * Legal and Social Aspect of Information Security
  * Software Engineering and Security
  * Security in Information Retrieval
  * Network Security
  * Forensics and Anti-Forensics
  * Mobile Communications Security and Vulnerabilities
  * CSIRTs, Incident Analysis and Response 

Deadlines =========

The following  dates are important if  you want to  participate in the

Abstract submission: no later than 1st June 2011

Full paper submission: no later than 30th June 2011 

Notification date: end of July 2011 

Submission guideline ====================

Authors should  submit a paper in  English up to 5.000  words, using a
non-proprietary  and open  electronic format.   The  program committee
will review all  papers and the author of each  paper will be notified
of  the  result,   by  electronic  means.   Abstract  is   up  to  400
words. Submissions must be sent to

Submissions should also include the following:

 1. Presenter, and geographical location (country of origin/passport)
    and contact info.
 2. Employer and/or affiliations.
 3. Brief biography, list of publications or papers.
 4. Any significant presentation and/or educational 
 5. Reason why this material is innovative or significant 
    or an important tutorial.
 6. Optionally, any samples of prepared material or outlines ready.
 7. Information about if yes or no the submission has already 
    been presented and where. 

    Presentations/topics that haven't been presented before 
    will be rewarded.

The information will be used only  for the sole purpose of the
convention including  the information on  the public website.   If you
want to remain anonymous, you have the right to use a nickname.

If the paper  is not accepted in the main track,  it could be accepted
in  short or lightning  talk session  but in  this case  the speakers'
privileges are not applicable.

Speakers' Privileges ====================

    * Accommodation will be provided (3 nights)
    * Travel expenses will be covered up to a max amount 
    * Conference speakers night

Publication and rights ======================

Authors keep the  full rights on their publication/papers  but give an
unrestricted  right  to  redistribute  their papers  for  the
convention and its related electronic/paper publication.

Sponsoring ==========

If  you  want  to  support  the  initiative  and  gain  visibility  by
sponsoring, please contact us by writing an e-mail to info(AT)

Web site and wiki =================

CfP website:

ceas2011 | 10 Mar 07:19 2011

Call for Papers: CEAS 2011, Antispam & Security Conference, Sept 2011, Perth, Australia, ERA-B

Call for Papers
8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011) 
Perth, Western Australia, 1-2 Sept, 2011 

Proudly Hosted by the Anti Spam Research Lab in the Digital Ecosystems & Business Intelligence Institute,
Curtin University

Topics of Interests

Track: Email Spam
- Prevention & Detection Techniques 
- Scalability, reliability, archiving, and retrieval 
- Early Detection Techniques 
- Behaviour based Techniques	

Track: Network Security
- Message filtering, organization, and security 
- Network layer protocols for anti spam 
- Network traffic monitoring for spam prevention 
- IP & MPLS security, Anti-DDoS techniques 
- Sand box, malware/botnet detection 
- Risk assessment, Vulnerability detection 
- Deep packet inspection, IPv6 security 

Track: Web Spam & Spam 2.0
- Adversarial learning using machine learning and NLP 
- Behaviour based techniques for spambot detection 
- Web spambot characterization 
- Botnet Detection & Elimination 	

Track: Information Technology Security
- Anti-Virus & Anti-Worm Techniques 
- Trojan horse & Data loss protection 
- Web Applications Security 
- IM & Email Security 
- Cloud computing security 

Track: Spam & Security in Social Networks
- Social networking security, privacy, and fraud prevention 
- Collaborative filtering of user-generated content 
- Protocols & standards for social networking, collaboration 
- Crowdsourcing analysis, applications, and theory 
- Novel uses of wikis and blogs in science, problem solving, 
- Studies on the use of citizen science and human-based computing 
- Novel modes of distributed collaboration 
- User trust and reputation 
- Terrorist network identification 	

Track: Security Technologies
- Information hiding and watermarking 
- Security processor / chip 
- Encryption and Decryption algorithm 
- Mobile device security 
- Code analysis 
- Trusted computing 
- Software security 
- Black box & White box testing 
- Penetration testing 
- Model driven security 

Track: Cyber Crime
- Collaboration in adversarial environments 
- Studies of abuse tactics and patterns 
- Standards for abuse reporting and monitoring 
- User identity issues that relate to the conference topics 
- Phishing Attacks, Real Case Studies on Phishing 
- Links between Scam, Fraud and Spam 
- Case studies on scam & fraud , Cyber Forensics 

Track: Security Management
- Information Security Management System 
- Security Operation Center 
- System security architecture 
- Framework and standards 
- Disaster recovery 
- IT control and audit 

Track: Spam Economics
- Modeling & analysis of economics of abuse, phishing, spam, & fraud 
- Studies on Cost Benefit Analysis of Spam 
- Money Laundering 
- Underground Spam Economy 	 

Important Dates
Abstract Deadline	5th April 2011
Submission Deadline	15th April 2011
Author Notification	15th June 2011
Final Accepted Papers Due	15th Aug 2011
Conference Dates	1st & 2nd Sept 2011

********CEAS 2011 is a ERA-B Conference********
Warm Regards

Conference General Chair
Vidyasagar M. Potdar
CEAS 2011 

Hafez Kamal | 8 Mar 11:14 2011

[HITB-Announce] HITB Magazine Call for Articles

HITB Magazine is currently seeking submissions for our next issue. If you have something interesting to
write, please drop us an email at: editorial <at>


Topics of interest include, but are not limited to the following:

* New Attack and Defense Techniques
* Reverse Code Engineering
* Network Security
* Forensics and Incident Response
* WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security
* Cryptography
* Hardware Hacking
* Malware Analysis
* Lock Picking / Physical Security

HITB Magazine is a deep-knowledge technical magazine. Articles that are more technical or that discuss
new and never
before seen attack methods are of more interest than a subject that has been covered several times before.
Please send
your article to editorial () hackinthebox org

Submissions for issue #6 due no later than 5th of April 2011

Hafez Kamal
Hack in The Box (M) Sdn. Bhd.
Suite 26.3, Level 26, Menara IMC,
No. 8 Jalan Sultan Ismail,
50250 Kuala Lumpur,

Tel: +603-20394724
Fax: +603-20318359

Serguei A. Mokhov | 19 Feb 10:39 2011

Privacy, Security, Trust (PST 2011) - Call for Papers

[ Apologies if you receive multiple copies of this announcement. Please
  pass it on to your colleagues and students who might be interested in
  contributing. ]

Ninth Annual Conference on Privacy, Security and Trust

July 19-21, 2011
Montreal, Quebec, Canada

Call for Papers

The PST2011 International Conference on Privacy, Security and Trust (PST)
is being held in Montreal, Quebec, Canada, July 19-21, 2011. PST2011 is
the ninth such annual conference focusing on PST technologies. PST2011
provides a forum for researchers world-wide to unveil their latest work in
privacy, security and trust and to show how this research can be used to
enable innovation.

Easychair submission link of PST 2011:


Submission Deadline:        March 20, 2011
Notification of Acceptance: May 9, 2011
Final Manuscript Due:       May 22, 2011

PST2011 will include an Innovation Day featuring workshops and tutorials
followed by two days of high-quality research papers whose topics include,
but are NOT limited to, the following:

  * Privacy Preserving / Enhancing Technologies
  * Trust Technologies, Technologies for Building Trust in e-Business Strategy
  * Critical Infrastructure Protection
  * Observations of PST in Practice, Society, Policy and Legislation
  * Network and Wireless Security
  * Digital Rights Management
  * Operating Systems Security
  * Identity and Trust management
  * Intrusion Detection Technologies
  * PST and Cloud Computing
  * Secure Software Development and Architecture
  * Human Computer Interaction and PST
  * PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce
  * Implications of, and Technologies for, Lawful Surveillance
  * Network Enabled Operations
  * Biometrics, National ID Cards, Identity Theft
  * Digital forensics
  * PST and Web Services / SOA
  * Information Filtering, Data Mining & Knowledge from Data
  * Privacy, Traceability, and Anonymity
  * National Security and Public Safety
  * Trust and Reputation in Self-Organizing Environments
  * Security Metrics
  * Anonymity and Privacy vs. Accountability
  * Recommendation, Reputation and Delivery Technologies
  * Access Control and Capability Delegation
  * Continuous Authentication
  * Representations and Formalizations of Trust in Electronic and
    Physical Social Systems

High-quality papers in all PST related areas that, at the time of
submission, are not under review and have not already been published or
accepted for publications elsewhere are solicited. Accepted papers will
either be accepted as regular papers up to 8 pages and with oral
presentations, or short papers of up to 2 pages with poster presentations.
Up to 2 additional pages will be allowed in each category with over-length
charges. The standard IEEE two-column conference format should be used for
all submissions. A copy of the IEEE Manuscript Templates for Microsoft
Word or LaTeX and additional information about paper submission and
conference topics and events can be found at the conference web site. All
accepted papers will be published in the conference proceedings and by
IEEE and will be accessible via IEEE Xplore Digital Library. Best Paper
and Best Student Paper awards will be presented. Some travel grants to
students who are presenting their work in the conference will also be made

Organizing Committee

Honorary Conference Chair:
  Andrew Vallerand, Director S&T Public Security, National Defense, Canada

General Co-Chairs:
  Mourad Debbabi, Concordia University, Canada
  Amr M. Youssef, Concordia University, Canada

Program Co-Chairs:
  Frederic Cuppens (Privacy), ENST-Bretagne, France
  Natalia Stakhanova (Security), University of South Alabama, USA
  Jianying Zhou (Trust), Institute for Infocomm Research, Singapore

Workshop & Tutorial Chair:
  Ali Miri, Ryerson University, Canada

Poster Session Chair:
  Franois Cosquer, Alcatel Lucent, France

Publication & Publicity Chair:
  Indrajit Ray, Colorado State University, USA
  Carlisle Adams, University of Ottawa, Canada

PST Steering Committee Chair:
  Ali Ghorbani, University of New Brunswick, Canada

Conference Manager:
  Greg Sprague, National Research Council, Canada

Local Arrangements:
  Benjamin Fung, Concordia University, Canada

  Ilia Goldfarb, National Research Council, Canada

Finance and Registration:
  Linda Vienneau, National Research Council, Canada

Privacy Theme

Privacy concerns the operational policies, procedures and regulations
implemented within an information system to control for the unauthorized
use of, access to, or release of personal information held in any format.
Topics of interest in this theme include (but are not limited to):

  * privacy preserving/enhancing technologies
  * identity management and biometrics
  * privacy and ubiquitous computing, e.g. RFIDs
  * reputation, privacy and communities
  * e-health and privacy
  * anonymity and medical research
  * employee privacy and network administration
  * privacy and location-based technologies and services
  * privacy and traceability
  * spyware and stalking
  * anonymity, pseudonimity and accountability
  * responding to hate speech, flaming and trolls
  * privacy and emergency management policies and technologies
  * vulnerable online users and privacy sensitization
  * evolving nature of  lawful surveillance
  * smart cards and privacy
  * identity theft and management
  * privacy audits and risk analysis
  * evolving role of privacy officers

Privacy Theme Chair:
  Frederic Cuppens, TELECOM Bretagne, France

Privace Theme Committee:
  Sushil Jajodia, George Mason University, USA
  Vijay Atluri, Rutgers University, USA
  Joaquin Garcia-Alfaro, Telecom Bretagne, France
  Nora Cuppens-Boulahia, Telecom Bretagne, France
  Alban Gabillon, Universit de la Polynsie Franaise, France
  Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
  Ernesto Damiani (Universit degli Studi di Milano, Italy)
  Ehud Gudes, Ben-Gurion University, Israel
  Carlisle Adams, University of Ottawa
  Esma Aimeur, University of Montreal
  Norm Archer, McMaster University
  Debra Grant, Office of the Information and Privacy Commissioner of Canada
  Steve Johnston, Office of the Privacy Commissioner of Canada
  Bradley Malin, Vanderbilt University
  Jian Pei, Simon Fraser University
  Teresa Scassa, University of Ottawa
  Jean-Marc Seigneur, University of Geneva
  Lisa Singh, Georgetown University
  Traian Truta, Northern Kentucky University
  Jens Weber, University of Victoria

Security Theme

Security addresses the various components of an information system that
safeguard the data and associated infrastructure from unauthorized
activity. Topics of interest in this theme include (but are not limited

  * access control
  * adaptive security and system management
  * analysis of network and security protocols
  * applications of cryptographic techniques
  * attacks against networks and machines
  * authentication and authorization of users, systems, and applications
  * botnets
  * critical infrastructure security
  * firewall technologies
  * forensics and diagnostics for security
  * intrusion and anomaly detection and prevention
  * malicious code analysis, anti-virus, anti-spyware
  * network infrastructure security
  * operating system security
  * public safety and emergency management
  * security architectures
  * security in heterogeneous and large-scale environments
  * techniques for developing secure systems
  * web security
  * wireless and pervasive/ubiquitous computing security

Security Theme Chair:
  Natalia Stakhanova, University of South Alabama, USA

Security Theme Committee:

  Michel Barbeau, Carleton University, Canada
  Mike Burmester, Florida State University, US
  Alvaro A. Cardenas, Fujitsu Laboratories, US
  Anton Chuvakin, Security Warrior Consulting, US
  Mathieu Couture, CRC, Canada
  Jos M. Fernandez, Ecole Polytechnique, Montreal, Canada
  Thorsten Holz, Ruhr-University Bochum, Germany
  Mohammed Houssaini Sqalli, King Fahd University of Petroleum & Minerals, Saudi Arabia
  H. Gunes Kayacik, Carleton University, Canada
  David Lie, University of Toronto, Canada
  Wei Lu, Keene State College, US
  Xinming Ou, Kansas State University, US
  Maria Papadaki, University of Plymouth, UK
  Nadia Tawbi, Universit Laval, Canada
  Julie Thorpe, University of Ontario Institute of Technology, Canada
  Issa Traore, University of Victoria, Canada
  Isaac Woungang, Ryerson University, Canada
  Alec Yasinsac, University of South Alabama, US
  Nur Zincir-Heywood, Dalhousie University, Canada

Trust Theme

Trust is a fundamental human behavior. It is necessary for people to
function in social groups, and it forms the foundation for many of our
organizations and relationships. The conference solicits original papers
on any topic related to the personal, social, and economic aspects of
trust. Topics of interest in this theme include (but are not limited to):

  * trust models
  * components and dimensions of trust
  * game theory and trusting behaviors
  * trust and risk
  * trust, regret, and forgiveness
  * perceptions of trustworthiness
  * trust management
  * automating trust decisions
  * attacks on trust
  * trust influences on security and privacy
  * economic drivers for trustworthy systems
  * cross-cultural differences
  * computing about trust
  * applications of trust
  * trust and economics
  * trust in e-commerce
  * reputation systems

Trust Theme Chair:
  Jianying Zhou, Institute for Infocomm Research, Singapore

Trust Theme Committee:
  Habtamu Abie, Norwegian Computing Center, Norway
  Claudio Agostino Ardagna, Universit degli Studi di Milano, Italy
  Robin Cohen, University of Waterloo, Canada
  Rino Falcone, National Research Council, Italy
  Jordi Forne, UPC, Spain
  Xinyi Huang, I2R, Singapore
  Steve Kremer, INRIA, France
  Costas Lambrinoudakis, University of Piraeus, Greece
  Albert Levi, Sabanci University, Turkey
  Hui Li, Xidian University, China
  Joseph Liu, I2R, Singapore
  Sangjae Moon, Kyungpook National University, Korea
  Yuko Murayama, Iwate Prefectural University, Japan
  Jose Onieva, University of Malaga, Spain
  Rolf Oppliger, eSECURITY Technologies, Switzerland
  Gunther Pernul, Universitt Regensburg, Germany
  Pierangela Samarati, Universit degli Studi di Milano, Italy
  Guilin Wang, University of Wollongong, Australia
  Yunlei Zhao, Fudan University, China

Partners / Sponsors

University of New Brunswick, Canada
Information Security Center of eXcellence (ISCX)
Concordia University, Montreal, Canada
National Cyberforensics and Training Alliance (NCFTA), Canada