MAF 2016 - Special Session: Malware Analysis and Forensics in Smart Phones
Topics/Call fo Papers
Nowadays smart phones are widely used for making phone calls, sending messages, storing personal data, internet browsing, online banking etc. Hence smart phones have become a potential target for cyber attack. Malware attacks in the smart phones have been growing at an alarming rate. Therefore, it is essential to ensure security in mobile platforms.
The special session on Malware Analysis and Forensics in Smart Phones aims to provide an international forum for the dissemination of original research results, new ideas and practical development experiences in the detection and analysis of malwares in smart phones as well as the forensics of the malicious activities carried out by the malwares.
This special session will focus on the following subjects of interest, as well as related issues:
Malware detection mechanisms
Classification of Malwares based on the attacks
Characterization of behavior of Malwares
Statistical and data mining techniques for malware analysis and detection
Identification of source of attack
Memory forensics
Network Forensics
Static and dynamic analysis for malware
Bigdata Analytics in Malware Analysis and Forensics
Tool testing and development
Digital evidence storage, preservation, and the law
Forensics of the malware attacks especially in the cases of Trojan or spyware
The special session on Malware Analysis and Forensics in Smart Phones aims to provide an international forum for the dissemination of original research results, new ideas and practical development experiences in the detection and analysis of malwares in smart phones as well as the forensics of the malicious activities carried out by the malwares.
This special session will focus on the following subjects of interest, as well as related issues:
Malware detection mechanisms
Classification of Malwares based on the attacks
Characterization of behavior of Malwares
Statistical and data mining techniques for malware analysis and detection
Identification of source of attack
Memory forensics
Network Forensics
Static and dynamic analysis for malware
Bigdata Analytics in Malware Analysis and Forensics
Tool testing and development
Digital evidence storage, preservation, and the law
Forensics of the malware attacks especially in the cases of Trojan or spyware
Other CFPs
Last modified: 2016-02-28 23:09:20