Academic journals for latest RE/Malware/Exploitation research?












2















I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










share|improve this question





























    2















    I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










    share|improve this question



























      2












      2








      2








      I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










      share|improve this question
















      I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.







      malware






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 10 hours ago









      perror

      11.1k1767129




      11.1k1767129










      asked 11 hours ago









      Chase KanipeChase Kanipe

      263




      263






















          3 Answers
          3






          active

          oldest

          votes


















          3














          You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



          Still Alive Conferences





          • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


          • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


          • WOOT (Workshop on Offensive Technologies) (12 years old)


          • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


          • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


          • BotConf (Botnet fighting Conference) (6 years)


          • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


          • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


          Discontinued Conferences





          • WCRE (Working Conference on Reverse Engineering)


          • SPRO (Workshop on Software PROtection)


          These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






          share|improve this answer































            2














            This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



            (links are to the archives of the conferences, whenever possible)




            • Infiltrate

            • OffensiveCon


            • RECon


              • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

              • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



            • USENIX Workshop on Offensive Technologies (WOOT)

            • USENIX Security Symposium


            Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






            share|improve this answer










            New contributor




            hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.





















            • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

              – perror
              10 hours ago



















            0














            There is also malware conference which has been running since at least 2011.
            https://www.malwareconference.org/






            share|improve this answer























              Your Answer








              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "489"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: false,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: null,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              noCode: true, onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });














              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              3 Answers
              3






              active

              oldest

              votes








              3 Answers
              3






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              3














              You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



              Still Alive Conferences





              • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


              • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


              • WOOT (Workshop on Offensive Technologies) (12 years old)


              • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


              • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


              • BotConf (Botnet fighting Conference) (6 years)


              • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


              • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


              Discontinued Conferences





              • WCRE (Working Conference on Reverse Engineering)


              • SPRO (Workshop on Software PROtection)


              These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






              share|improve this answer




























                3














                You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



                Still Alive Conferences





                • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


                • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


                • WOOT (Workshop on Offensive Technologies) (12 years old)


                • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


                • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


                • BotConf (Botnet fighting Conference) (6 years)


                • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


                • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


                Discontinued Conferences





                • WCRE (Working Conference on Reverse Engineering)


                • SPRO (Workshop on Software PROtection)


                These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






                share|improve this answer


























                  3












                  3








                  3







                  You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



                  Still Alive Conferences





                  • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


                  • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


                  • WOOT (Workshop on Offensive Technologies) (12 years old)


                  • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


                  • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


                  • BotConf (Botnet fighting Conference) (6 years)


                  • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


                  • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


                  Discontinued Conferences





                  • WCRE (Working Conference on Reverse Engineering)


                  • SPRO (Workshop on Software PROtection)


                  These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






                  share|improve this answer













                  You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



                  Still Alive Conferences





                  • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


                  • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


                  • WOOT (Workshop on Offensive Technologies) (12 years old)


                  • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


                  • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


                  • BotConf (Botnet fighting Conference) (6 years)


                  • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


                  • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


                  Discontinued Conferences





                  • WCRE (Working Conference on Reverse Engineering)


                  • SPRO (Workshop on Software PROtection)


                  These lists are definitely non-exhaustive, so feel free to tell me if I forget something!







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered 10 hours ago









                  perrorperror

                  11.1k1767129




                  11.1k1767129























                      2














                      This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                      (links are to the archives of the conferences, whenever possible)




                      • Infiltrate

                      • OffensiveCon


                      • RECon


                        • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                        • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                      • USENIX Workshop on Offensive Technologies (WOOT)

                      • USENIX Security Symposium


                      Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                      share|improve this answer










                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.





















                      • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                        – perror
                        10 hours ago
















                      2














                      This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                      (links are to the archives of the conferences, whenever possible)




                      • Infiltrate

                      • OffensiveCon


                      • RECon


                        • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                        • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                      • USENIX Workshop on Offensive Technologies (WOOT)

                      • USENIX Security Symposium


                      Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                      share|improve this answer










                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.





















                      • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                        – perror
                        10 hours ago














                      2












                      2








                      2







                      This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                      (links are to the archives of the conferences, whenever possible)




                      • Infiltrate

                      • OffensiveCon


                      • RECon


                        • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                        • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                      • USENIX Workshop on Offensive Technologies (WOOT)

                      • USENIX Security Symposium


                      Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                      share|improve this answer










                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.










                      This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                      (links are to the archives of the conferences, whenever possible)




                      • Infiltrate

                      • OffensiveCon


                      • RECon


                        • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                        • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                      • USENIX Workshop on Offensive Technologies (WOOT)

                      • USENIX Security Symposium


                      Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.







                      share|improve this answer










                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.









                      share|improve this answer



                      share|improve this answer








                      edited 4 hours ago





















                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.









                      answered 10 hours ago









                      hairlessbearhairlessbear

                      1075




                      1075




                      New contributor




                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.





                      New contributor





                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.






                      hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                      Check out our Code of Conduct.













                      • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                        – perror
                        10 hours ago



















                      • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                        – perror
                        10 hours ago

















                      Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      10 hours ago





                      Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      10 hours ago











                      0














                      There is also malware conference which has been running since at least 2011.
                      https://www.malwareconference.org/






                      share|improve this answer




























                        0














                        There is also malware conference which has been running since at least 2011.
                        https://www.malwareconference.org/






                        share|improve this answer


























                          0












                          0








                          0







                          There is also malware conference which has been running since at least 2011.
                          https://www.malwareconference.org/






                          share|improve this answer













                          There is also malware conference which has been running since at least 2011.
                          https://www.malwareconference.org/







                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered 1 hour ago









                          TJ NelTJ Nel

                          493




                          493






























                              draft saved

                              draft discarded




















































                              Thanks for contributing an answer to Reverse Engineering Stack Exchange!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              Список кардиналов, возведённых папой римским Каликстом III

                              Deduzione

                              Mysql.sock missing - “Can't connect to local MySQL server through socket”