Special Session on Malware Analysis and Forensics in Smart Phones
Nowadays smart phones are widely used for making phone calls, sending messages, storing personal data, internet browsing, online banking etc. Hence smart phones have become a potential target for cyber attack. Malware attacks in the smart phones have been growing at an alarming rate. Therefore, it is essential to ensure security in mobile platforms.
The special session on Malware Analysis and Forensics in Smart Phones aims to provide an international forum for the dissemination of original research results, new ideas and practical development experiences in the detection and analysis of malwares in smart phones as well as the forensics of the malicious activities carried out by the malwares.
This special session invites original and unpublished contributions addressing Malware Analysis and Forensics in Smart Phones. Authors should submit their papers online using EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/web/call-for-papers
Topics of interest include, but are not limited to:
- Malware detection mechanisms
- Classification of Malwares based on the attacks
- Characterization of behavior of Malwares
- Statistical and data mining techniques for malware analysis and detection
- Identification of source of attack
- Memory forensics
- Network Forensics
- Static and dynamic analysis for malware
- Bigdata Analytics in Malware Analysis and Forensics
- Tool testing and development
- Digital evidence storage, preservation, and the law
- Forensics of the malware attacks especially in the cases of Trojan or spyware
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. The manuscripts should be submitted in PDF format. Acceptance of papers will be communicated to authors by email. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline. Accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
Special Session Organiser
Dr. Tony Thomas
Indian Institute of Information Technology and Management- Kerala, Thiruvananthapuram,
|Paper Submission Ends||May 11, 2015 (Firm)|
|Acceptance Notification||May 25, 2015|
|Final Paper Deadline||June 25, 2015|