Academic journals for latest RE/Malware/Exploitation research?












2















I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










share|improve this question





























    2















    I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










    share|improve this question



























      2












      2








      2








      I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.










      share|improve this question
















      I am looking for journals to keep track of the latest advances in reverse engineering, binary analysis, malware, binary exploitation, etc.







      malware






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 7 hours ago









      perror

      11.1k1767129




      11.1k1767129










      asked 8 hours ago









      Chase KanipeChase Kanipe

      263




      263






















          2 Answers
          2






          active

          oldest

          votes


















          2














          You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



          Still Alive Conferences





          • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


          • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


          • WOOT (Workshop on Offensive Technologies) (12 years old)


          • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


          • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


          • BotConf (Botnet fighting Conference) (6 years)


          • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


          • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


          Discontinued Conferences





          • WCRE (Working Conference on Reverse Engineering)


          • SPRO (Workshop on Software PROtection)


          These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






          share|improve this answer































            1














            This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



            (links are to the archives of the conferences, whenever possible)




            • Infiltrate

            • OffensiveCon


            • RECon


              • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

              • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



            • USENIX Workshop on Offensive Technologies (WOOT)

            • USENIX Security Symposium


            Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






            share|improve this answer










            New contributor




            hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.





















            • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

              – perror
              7 hours ago











            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "489"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



            Still Alive Conferences





            • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


            • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


            • WOOT (Workshop on Offensive Technologies) (12 years old)


            • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


            • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


            • BotConf (Botnet fighting Conference) (6 years)


            • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


            • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


            Discontinued Conferences





            • WCRE (Working Conference on Reverse Engineering)


            • SPRO (Workshop on Software PROtection)


            These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






            share|improve this answer




























              2














              You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



              Still Alive Conferences





              • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


              • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


              • WOOT (Workshop on Offensive Technologies) (12 years old)


              • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


              • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


              • BotConf (Botnet fighting Conference) (6 years)


              • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


              • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


              Discontinued Conferences





              • WCRE (Working Conference on Reverse Engineering)


              • SPRO (Workshop on Software PROtection)


              These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






              share|improve this answer


























                2












                2








                2







                You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



                Still Alive Conferences





                • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


                • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


                • WOOT (Workshop on Offensive Technologies) (12 years old)


                • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


                • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


                • BotConf (Botnet fighting Conference) (6 years)


                • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


                • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


                Discontinued Conferences





                • WCRE (Working Conference on Reverse Engineering)


                • SPRO (Workshop on Software PROtection)


                These lists are definitely non-exhaustive, so feel free to tell me if I forget something!






                share|improve this answer













                You have a few academic workshops and conferences about the topic (or close to the topic). But, most of them are appearing and disappearing quite often unfortunately. So, it is difficult to come with a long lasting list of conferences. Anyway, here is an attempt:



                Still Alive Conferences





                • RAID (International Symposium on Research in Attacks, Intrusions and Defenses) (21 years old)


                • Journal of Computer Virology and Hacking Techniques (Springer) (15 years old)


                • WOOT (Workshop on Offensive Technologies) (12 years old)


                • SSPREW (Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop) (8 years old)


                • CODASPY (ACM Conference on Data and Application Security and Privacy) (8 years old)


                • BotConf (Botnet fighting Conference) (6 years)


                • EuroS&P (IEEE European Symposium on Security and Privacy) (4 years old)


                • ROOTS (Reversing and Offensive-oriented Trends Symposium) (2 years old)


                Discontinued Conferences





                • WCRE (Working Conference on Reverse Engineering)


                • SPRO (Workshop on Software PROtection)


                These lists are definitely non-exhaustive, so feel free to tell me if I forget something!







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 8 hours ago









                perrorperror

                11.1k1767129




                11.1k1767129























                    1














                    This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                    (links are to the archives of the conferences, whenever possible)




                    • Infiltrate

                    • OffensiveCon


                    • RECon


                      • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                      • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                    • USENIX Workshop on Offensive Technologies (WOOT)

                    • USENIX Security Symposium


                    Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                    share|improve this answer










                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.





















                    • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      7 hours ago
















                    1














                    This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                    (links are to the archives of the conferences, whenever possible)




                    • Infiltrate

                    • OffensiveCon


                    • RECon


                      • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                      • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                    • USENIX Workshop on Offensive Technologies (WOOT)

                    • USENIX Security Symposium


                    Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                    share|improve this answer










                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.





















                    • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      7 hours ago














                    1












                    1








                    1







                    This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                    (links are to the archives of the conferences, whenever possible)




                    • Infiltrate

                    • OffensiveCon


                    • RECon


                      • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                      • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                    • USENIX Workshop on Offensive Technologies (WOOT)

                    • USENIX Security Symposium


                    Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.






                    share|improve this answer










                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.










                    This is an indirect answer to your question, but hopefully still useful. There are multiple conferences that feature state-of-the-art work in this space. If anyone knows of more, feel free to add on to this list.



                    (links are to the archives of the conferences, whenever possible)




                    • Infiltrate

                    • OffensiveCon


                    • RECon


                      • Frustratingly, they don't have a consistent method of posting slides/recordings. Generally, you can get to a year's contents by going to recon.cx/<year> (e.g. https://recon.cx/2017). Most of the time those pages have links to the slides and/or recordings from that year.

                      • Notably, Montreal 2018 is an exception to this rule. They decided to embed the slides in the schedule, for some reason.



                    • USENIX Workshop on Offensive Technologies (WOOT)

                    • USENIX Security Symposium


                    Bonus: PoC||GTFO is a completely different style of research than any conference listed above, but it's full of great information and is lots of fun to read.







                    share|improve this answer










                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.









                    share|improve this answer



                    share|improve this answer








                    edited 1 hour ago





















                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.









                    answered 7 hours ago









                    hairlessbearhairlessbear

                    874




                    874




                    New contributor




                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.





                    New contributor





                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.






                    hairlessbear is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.













                    • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      7 hours ago



















                    • Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                      – perror
                      7 hours ago

















                    Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                    – perror
                    7 hours ago





                    Ah! I thought it was only academic conferences!!! Sorry! Yes, Infiltrate, RECon and OffensiveCon are also well known! Good catch.

                    – perror
                    7 hours ago


















                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Reverse Engineering Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2freverseengineering.stackexchange.com%2fquestions%2f20403%2facademic-journals-for-latest-re-malware-exploitation-research%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    日野市

                    GameSpot

                    Tu-95轟炸機