Workshop Title:

Reverse Engineering Malware

Date:

May 24th, 2023 (CDT)

Organizer:

ITM Department, Illinois Institute of Technology, USA

Keywords:

  • Malware Analysis
  • Reverse Engineering
  • Cybersecurity
  • Threat Detection
  • Memory Forensics
  • Code Obfuscation
  • Malware Types
  • Hands-on Analysis
  • Decompilers
  • Debuggers

Workshop Chair:

Dr. Marwan Omar
Associate Professor in Illinois Institute of Technology

Personal Bio:

Dr. Omar's Academic career has consistently focused on applied, industry-relevant cyber security, Data Analytics, machine learning, application of AI to cyber security and digital forensics research and education that delivers real-world results. He brings a unique combination of industry experience as well as teaching experience gained from teaching across different cultures and parts of the world. He has an established self-supporting program in machine learning application to cyber security. He has established a respectable research record in AI and cyber security exemplified in the dozens of published papers and book chapters that have gained recognition among researchers and practitioners (more than 272 Google scholar citations thus far). He is actively involved in graduate as well as undergraduate machine learning education including curriculum development and assessment.

Dr. Omar has recently published two books with Springer on Machine Learning and Cyber Security and has also published research with IEEE conference on Sematic Computing. Additionally, Dr. Omar holds numerous industry certifications including Comptia Sec+, ISACA CDPSE, EC-Council Certified Ethical Hacker, and SANS Advanced Smartphone Forensics Analyst.

Dr. Omar has been very active and productive in both academia as well as the industry and he is currently serving as an associate professor of cyber security at Illinois Institute of Technology.

Workshop Description:

Background:

Cybersecurity professionals to possess the skills and knowledge necessary to identify and combat malware threats. Malware is a significant threat to organizations of all sizes, and cybercriminals are constantly developing new and more sophisticated forms of malware that can evade traditional detection methods.

Reverse engineering malware is the process of analyzing malicious code to understand its behavior and develop strategies for mitigating its risks. This process requires a deep understanding of programming languages, operating systems, and networking protocols, as well as specialized tools and techniques used to analyze malware.

The need for reverse engineering skills has grown as malware has become more prevalent and sophisticated. Malware attacks can have serious consequences, including theft of sensitive data, financial losses, and disruption of critical systems. Cybersecurity professionals must be able to quickly identify and analyze new forms of malware to protect their organizations and prevent these outcomes.

The development of the workshop on reverse engineering malware reflects the industry's recognition of the importance of this skill set. The workshop provides attendees with the opportunity to learn from experienced practitioners in the field and gain hands-on experience with the tools and techniques used in malware analysis.

In conclusion, the workshop on reverse engineering malware is a response to the growing need for cybersecurity professionals with the skills and knowledge necessary to combat malware threats. With the continued evolution of the threat landscape, it is essential that professionals in the field stay up-to-date with the latest tools and techniques to protect their organizations and prevent cyber attacks.

Goal/Rationale:

The goal of the workshop on reverse engineering malware is to provide cybersecurity professionals with the skills and knowledge necessary to identify and combat malware threats. The workshop is designed to equip attendees with a deep understanding of malware analysis techniques and the tools used in the process.

By the end of the workshop, attendees should be able to:

1. Understand the basics of malware analysis, including common malware types and their methods of propagation. information from unauthorized access or theft. This would include:

2. Use specialized tools such as disassemblers, debuggers, and decompilers to analyze malware samples.

3. Identify malicious code and understand its behavior.

Scope and Information for Participants:

The scope of the workshop on reverse engineering malware is to provide attendees with a comprehensive understanding of malware analysis techniques and tools. The workshop covers a wide range of topics, including:

1. Malware types: The workshop covers common malware types such as viruses, worms, trojans, and ransomware, as well as their methods of propagation.

2. Reverse engineering techniques: Attendees will learn how to use specialized tools such as disassemblers, debuggers, and decompilers to analyze malware samples and identify malicious code.

The workshop is designed to be comprehensive, covering all aspects of malware analysis from basic concepts to advanced techniques. It is suitable for cybersecurity professionals with varying levels of experience, from those new to the field to those with advanced skills.

Highlights:

Reverse engineering malware is a critical skill for cybersecurity professionals, and a workshop on this topic can provide attendees with the knowledge and tools necessary to identify and combat malware threats. The workshop typically covers topics such as the basics of malware analysis, reverse engineering techniques, and tools used in the process.

Attendees will learn how to use tools such as disassemblers, debuggers, and decompilers to analyze malware samples and understand their behavior. They will also gain an understanding of common malware types and their methods of propagation, including viruses, worms, trojans, and ransomware. The workshop may also cover topics such as memory forensics and code obfuscation, which are advanced techniques used to analyze and combat more sophisticated malware threats. Attendees will learn how to identify and analyze malicious code,identify system changes made by malware, and detect any attempts to evade detection.

Throughout the workshop, attendees will have the opportunity to practice their skills by analyzing real-world malware samples. By the end of the workshop, attendees will have a better understanding of how malware operates, how to identify and analyze it, and how to develop strategies for mitigating the risks posed by malware threats.

Overall, a workshop on reverse engineering malware is an essential training opportunity for cybersecurity professionals looking to stay ahead of the evolving threat landscape. With the skills and knowledge gained from this workshop, attendees will be better equipped to identify, analyze, and respond to malware threats, ultimately helping to protect their organizations from cyber attacks.

Access to Workshop:

CONF-MSS 2023 Workshop -- Chicago - YouTube

Venue:

Illinois Institute of Technology, 10 W 35th St, Chicago, IL 60616

VISA:


U.S. Visas (state.gov)

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. This page just gives some general information of the visa application.

US Visa Information

The B-1/B-2 visitor visa is for people traveling to the United States temporarily for business (B-1) or for pleasure or medical treatment (B-2). Generally, the B-1 visa is for travelers consulting with business associates; attending scientific, educational, professional, or business conventions/conferences; settling an estate; or negotiating contracts. The B-2 visa is for travel that is recreational in nature, including tourism; visits with friends or relatives; medical treatment; and activities of a fraternal, social, or service nature. Often, the B-1 and B-2 visas are combined and issued as one visa: the B-1/B-2.

Application Items

If you apply for a business/tourist visa, you must pay your $160 application fee and submit the following:

  • A Nonimmigrant Visa Electronic Application (DS-160) Form. Visit the DS-160 web page for more information about the DS-160.
  • A passport valid for travel to the United States with a validity date at least six months beyond your intended period of stay in the United States (unless country-specific agreements provide exemptions). If more than one person is included in your passport, each person desiring a visa must submit an application.
  • One (1) 2 x 2 inches (51 x 51 mm) photograph taken within the last six months.
  • If a visa is issued, there may be an additional visa issuance reciprocity fee, depending on your nationality.

In addition to these items, you must present an interview appointment letter confirming that you booked an appointment through this service. You may also bring whatever supporting documents you believe support the information provided to the consular officer.

Supporting Documents

  • Invitation letter from business or school.
  • Detailed CV or resume including a list of publications.
  • Complete itinerary, including all meetings, conferences, and visits; include names, addresses, and telephone numbers of your hosts.
  • For other materials, please refer to the U.S. Embassy or Consulate website.

NOTICE:

Should your application be denied, the organizing committee cannot change the decision of visa officer, nor will CONF-MSS engage in discussion or correspondence with the visa application center on behalf of the applicant. The registration fee CANNOT be refunded when the VISA application of individual being denied.