Workshop Program

November 3-6, 2014

RSDA 2014 at a Glance

Time Monday, November 3

Royal Continental Hotel
Catalana Room
Tuesday, November 4

Conference Center
Room A
09:00 - 09:15 Registration Registration
09:15 - 09:30 RSDA Welcome and Opening Registration
09:30 - 10:30 S1 - Vulnerability Analysis ISSRE 2014
Conference Program
10:30 - 11:00 Coffee Break
11:00 - 11:30 RSDA Keynote #1
Leyla Yumer, Symantec Research
11:30 - 12:30 S2 - Security Data Mining ISSRE 2014
Conference Program

12:30 - 14:00 Lunch
14:00 - 15:00 S3 Data-driven Analysis RSDA Keynote #2
Brendan Murphy, Microsoft Research
15:00 - 15:30 S5 Anomaly detection
15:30 - 16:00 Coffee Break
16:00 - 18:00 S4 - Reliable and Secure Design S6 - Internet Threats and

RSDA Welcome and Opening
Monday, Nov. 3, 09:15 - 09:30

Antonio Pecchia, Olivier Thonnard

RSDA S1 Vulnerability Analysis
Monday, Nov. 3, 09:30 - 10:30
Chair: Antonio Pecchia, Federico II University of Naples

1. Bindu Madhavi Padmanabhuni and Hee Beng Kuan Tan.
    Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code

2. Jeffrey Stuckman and James Purtilo.
    Mining security vulnerabilities from Linux distribution metadata

RSDA Keynote #1
Monday, Nov. 3, 11:00 - 11:30
Chair: Olivier Thonnard, Amadeus

Leyla Yumer, Symantec Research
From Script-kiddies to Cyberwars...

RSDA S2 Security Data Mining
Monday, Nov. 3, 11:30 - 12:30
Chair: Olivier Thonnard, Amadeus

1. Carlo Schafer.
    Detection of Compromised Email Accounts used by a Spam Botnet with the Country
    Counting and the Theoretical Geographical Travelling Speed Extracted from Metadata

2. Andrea Paudice, Santonu Sarkar and Domenico Cotroneo.
    An Experiment with Conceptual Clustering for the Analysis of Security Alerts

RSDA S3 Data-driven Analysis
Monday, Nov. 3, 14:00 - 15:00
Chair: Marcello Cinque, Federico II University of Naples

1. Xin Chen, Charng-Da Lu and Karthik Pattabiraman.
    Failure Prediction of Jobs in Compute Clouds: A Google Cluster Case Study
2. Cagatay Turkay, Stephen Mason, Bojan Cukic and Ilir Gashi.
    Supporting Decision-making for Biometric System Deployment through Visual Analysis
3. Joao Matos, Nuno Coracao and Joao Garcia.
    Record and Replay GUI-based Applications with Less Overhead

RSDA S4 Secure and Reliable Design
Monday, Nov. 3, 16:00 - 18:00
Chair: Keun Soo Yim, Google

1. Stefano Rosiello, Amish Choudhary, Arpan Roy and Rajeshwari Ganesan.
    Combining Black box testing with White box Code Analysis: a Heterogeneous Approach
    for Testing Enterprise Applications

2. Peter T. Breuer and Jonathan P. Bowen.
    Avoiding Hardware Aliasing: Verifying RISC Machine and Assembly Code for Encrypted

3. Ingo Stierand, Sunil Malipatlolla, Sibylle Froschle, Alexander Stuhring and
    Stefan Henkler.
    Integrating the Security Aspect into Design Space Exploration of Embedded Systems
4. Anna Kobusinska.
    On the equivalence of SOA rollback-recovery consistency models

RSDA Keynote #2
Tuesday, Nov. 4, 14:00 - 15:00
Chair: Domenico Cotroneo, Federico II University of Naples

Brendan Murphy, Microsoft Research
The role of data analytics in reliability and security verification

RSDA S5 Anomaly Detection
Tuesday, Nov. 4, 15:00 - 15:30
Chair: Domenico Cotroneo, Federico II University of Naples

1. Flavio Frattini, Santonu Sarkar, Jyotiska Nath Khasnabish, and Stefano Russo.
    Using Invariants for Anomaly Detection: The Case Study of a SaaS Application

RSDA S6 Internet Threats and Countermeasures
Tuesday, Nov. 4, 16:00 - 18:00
Chair: Ilir Gashi, City University London

1. Andrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali and
    Luigi Mancini.
    Bypassing Censorship: a proven tool against the recent Internet censorship in Turkey
2. Miranda Mowbray and Josiah Hagen.
    Finding Domain-Generation Algorithms by Looking at Length Distributions
3. Wim Mees and Thibault Debatty.
    Multi-Agent System for APT Detection
4. Cesario Di Sarno, Nadir Murru, Felicita Di Giandomenico, Silvano Chiaradonna,
    Alessia Garofalo and Gianfranco Cerullo.
    Power Grid Outlier Treatment through Kalman Filter