


| 9:00-9:15 | Opening and Welcome |
| 9:15–10:15 | Keynote I: Maura Pintor (University of Cagliari) |
| Reliable Evaluation and Benchmarking of Machine Learning Models |
|
| 10:15-10:35 | Coffee Break |
| 10:35-11:35 | Technical Papers Session |
| 10:35: Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis
Aakanksha Saha (TU Wien), Jorge Blasco (UPM), Martina Lindorfer (TU Wien) | |
| 10:55: Position: On potential malware & new attack vectors for Internet-of-Brains (IoB)
Tuomo Lahtinen (Binare.io, University of Jyväskylä), Andrei Costin (University of Jyväskylä), Guillermo Suarez-Tangil (IMDEA Network Institute), Hannu Turtiainen (Binare.io, University of Jyväskylä) | |
| 11:15: Position: The explainability paradox – Challenges for XAI in malware detection and analysis
Rui Li (Leiden University), Olga Gadyatskaya (Leiden University) | |
| 11:35-12:30 | Keynote II: Daniel Arp (TU Berlin) |
| Lessons Learned in Mobile Malware Detection with Machine Learning |
|
| 12:30–13:30 | Lunch Break |
| 13:30–14:15 | Keynote III: Simone Aonzo (Eurecom) |
| [Demo] The Many Facets of Windows Malware and the Importance of Multi-Technology Analysis |
|
| 14:15-15:10 | Discussion Panel |
| Rethinking Malware Analysis |
|
| 15:10-15:15 | Closing remarks |
Malware research is a discipline of information security that aims to provide protection against unwanted and dangerous software. Since the mid-1980s, researchers in this area have been leading a technological arms race against creators of malware. Many ideas have been proposed, to varying degrees of effectiveness, from more traditional systems security and program analysis to the use of AI and Machine Learning. Nevertheless, with increased technological complexity and despite more sophisticated defenses, malware’s impact has grown, rather than shrunk. It appears that the defenders are continually reacting to yesterday’s threats, only to be surprised by today's minor variations.
The rise of Generative AI and Large Language models opens the path for new attackers strategies at reduced costs, and complicates the work for defenders.
This lack of robustness is most apparent in signature matching, where malware is represented by a characteristic substring. The fundamental limitation of this approach is its reliance on falsifiable evidence. Mutating the characteristic substring, i.e., falsifying the evidence, is effective in evading detection, and cheaper than discovering the substring in the first place. Unsurprisingly, the same limitation applies to malware detectors based on machine learning, as long as they rely on falsifiable features for decision-making. Robust malware features are necessary.
Furthermore, robust methods for malware classification and analysis are needed across the board to overcome phenomena including, but not limited to, concept drift (malware evolution), polymorphism, new malware families, new anti-analysis techniques, and adversarial machine learning, while supporting robust explanations. This workshop solicits work that aims to advance robust malware analysis, with the goal of creating long-term solutions to the threats of today’s digital environment. Potential research directions are malware detection, benchmark datasets, environments for malware arms race simulation, and exploring limitations of existing work, among others.
Topics of interest include (but are not limited to):
GenAI, Large Language Models, and Malware Topics related to the use of LLMs for both attack generation and detection, including:We invite the following types of papers:
Submissions must be anonymous (double-blind review), and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings.
Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P: eurosp2023-template.zip. Please do not use other IEEE templates.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader XI and when printed in black and white.
Accepted papers will be published in IEEE Xplore. One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings. Committee members are not required to read the appendices, so the paper should be intelligible without them. Submissions must be in English and properly anonymized.
The first edition of WoRMA took place in 2022, co-located with AsiaCCS in Nagasaki, Japan (https://worma.gitlab.io/2022/).
The second edition of WoRMA took place in 2023, co-located with IEEE EuroS&P in Delft, Netherlands (https://worma.gitlab.io/2023/).