WORM 2007 START Conference Manager    

The 5th ACM Workshop on Recurring Malcode

WORM 2007

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


To make a new submission, please fill in the form below, and then press the submit button at the bottom.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15

More Authors      Fewer Authors


Contact Information:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Building 
Mail Code 
Street Address 
City/Town*
State/Province 
Country*
Zip/Postal Code*


Submission Category:

Please enter the category under which the submission should be reviewed.

Submission Type:  


Abstract:

Type (or cut-and-paste) a short ASCII abstract for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.

 


Submit Paper:

Your submission must be in Adobe PDF (pdf) format, and the file name should end with the appropriate MIME extent (i.e., "pdf".). For example, your file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

Automatic malcode detection
Malicious code characterization
Botnet detection and disruption
Malcode reverse engineering
Modeling and analysis of propagation dynamics
Forensic methods of attribution
Threat assessment
Reactive countermeasures
Proactive malware defenses
Significant operational experiences
Measurement studies
New threats and related challenges
 
 



  
START Conference Manager (V2.54.5)