Academic journals for latest RE/Malware/Exploitation research?
I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.
malware
add a comment |
I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.
malware
add a comment |
I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.
malware
I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.
malware
malware
edited 10 hours ago
perror
11.1k1767129
11.1k1767129
asked 11 hours ago
Chase KanipeChase Kanipe
263
263
add a comment |
add a comment |
3 Answers
3
active
oldest
votes
You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:
Still Alive Conferences
RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)
Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)
WOOT (Workshop on Offensive Technologies) (12 years old)
SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)
CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)
BotConf (Botnet fighting Conference) (6 years)
EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)
ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)
Discontinued Conferences
WCRE (Working Conference on Reverse Engineering)
SPRO (Workshop on Software PROtection)
These lists are definitely non-exhaustive, so feel free to tell me if I forget something!
add a comment |
This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.
(links are to the archives of the conferences, whenever possible)
- Infiltrate
- OffensiveCon
RECon
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
recon.cx/<year>
(e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year. - Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
- USENIX Workshop on Offensive Technologies (WOOT)
- USENIX Security Symposium
Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.
New contributor
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
add a comment |
There is also malware conference which has been running since at least 2011.
https://www.malwareconference.org/
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "489"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:
Still Alive Conferences
RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)
Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)
WOOT (Workshop on Offensive Technologies) (12 years old)
SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)
CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)
BotConf (Botnet fighting Conference) (6 years)
EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)
ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)
Discontinued Conferences
WCRE (Working Conference on Reverse Engineering)
SPRO (Workshop on Software PROtection)
These lists are definitely non-exhaustive, so feel free to tell me if I forget something!
add a comment |
You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:
Still Alive Conferences
RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)
Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)
WOOT (Workshop on Offensive Technologies) (12 years old)
SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)
CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)
BotConf (Botnet fighting Conference) (6 years)
EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)
ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)
Discontinued Conferences
WCRE (Working Conference on Reverse Engineering)
SPRO (Workshop on Software PROtection)
These lists are definitely non-exhaustive, so feel free to tell me if I forget something!
add a comment |
You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:
Still Alive Conferences
RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)
Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)
WOOT (Workshop on Offensive Technologies) (12 years old)
SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)
CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)
BotConf (Botnet fighting Conference) (6 years)
EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)
ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)
Discontinued Conferences
WCRE (Working Conference on Reverse Engineering)
SPRO (Workshop on Software PROtection)
These lists are definitely non-exhaustive, so feel free to tell me if I forget something!
You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:
Still Alive Conferences
RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)
Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)
WOOT (Workshop on Offensive Technologies) (12 years old)
SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)
CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)
BotConf (Botnet fighting Conference) (6 years)
EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)
ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)
Discontinued Conferences
WCRE (Working Conference on Reverse Engineering)
SPRO (Workshop on Software PROtection)
These lists are definitely non-exhaustive, so feel free to tell me if I forget something!
answered 10 hours ago
perrorperror
11.1k1767129
11.1k1767129
add a comment |
add a comment |
This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.
(links are to the archives of the conferences, whenever possible)
- Infiltrate
- OffensiveCon
RECon
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
recon.cx/<year>
(e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year. - Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
- USENIX Workshop on Offensive Technologies (WOOT)
- USENIX Security Symposium
Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.
New contributor
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
add a comment |
This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.
(links are to the archives of the conferences, whenever possible)
- Infiltrate
- OffensiveCon
RECon
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
recon.cx/<year>
(e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year. - Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
- USENIX Workshop on Offensive Technologies (WOOT)
- USENIX Security Symposium
Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.
New contributor
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
add a comment |
This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.
(links are to the archives of the conferences, whenever possible)
- Infiltrate
- OffensiveCon
RECon
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
recon.cx/<year>
(e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year. - Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
- USENIX Workshop on Offensive Technologies (WOOT)
- USENIX Security Symposium
Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.
New contributor
This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.
(links are to the archives of the conferences, whenever possible)
- Infiltrate
- OffensiveCon
RECon
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
recon.cx/<year>
(e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year. - Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.
- Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to
- USENIX Workshop on Offensive Technologies (WOOT)
- USENIX Security Symposium
Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.
New contributor
edited 4 hours ago
New contributor
answered 10 hours ago
hairlessbearhairlessbear
1075
1075
New contributor
New contributor
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
add a comment |
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.
– perror
10 hours ago
add a comment |
There is also malware conference which has been running since at least 2011.
https://www.malwareconference.org/
add a comment |
There is also malware conference which has been running since at least 2011.
https://www.malwareconference.org/
add a comment |
There is also malware conference which has been running since at least 2011.
https://www.malwareconference.org/
There is also malware conference which has been running since at least 2011.
https://www.malwareconference.org/
answered 1 hour ago
TJ NelTJ Nel
493
493
add a comment |
add a comment |
Thanks for contributing an answer to Reverse Engineering Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown