Technical Papers Session I: Robustifying AI Detectors | |
Mitigating Information Leakage in Large Language Models: Evaluating the Impact of Code Obfuscation on Vulnerability Detection
Bengü Gülay (Sabancı University), Cemal Yılmaz (Sabancı University) | |
Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection
Andrea Ponte (University of Genova), Luca Demetrio (University of Genova), Luca Oneto (University of Genova), Ivan Tesfai Ogbu (Rina Consulting S.p.A.), Battista Biggio (University of Cagliari), Fabio Roli (University of Genova, University of Cagliari) | |
On the Effect of Ruleset Tuning and Data Imbalance on Explainable Network Security Alert Classifications: a Case-Study on DeepCASE
Koen Teuwen (Eindhoven University of Technology), Sam Baggen (Eindhoven University of Technology), Emmanuele Zambon (Eindhoven University of Technology), Luca Allodi (Eindhoven University of Technology) | |
Technical Papers Session II: Improving Windows Malware Detection | |
Democratizing Generic Malware Unpacking
Thorsten Jenke (Fraunhofer FKIE), Max Ufer (Fraunhofer FKIE), Manuel Blatt (Fraunhofer FKIE), Leander Kohler (Universität Bonn), Elmar Padilla (Fraunhofer FKIE), Lilli Bruckschen (Fraunhofer FKIE) | |
Toward Automatically Generating User-specific Recovery Procedures after Malware Infections
Jerre Starink (University of Twente), Cassie Wanjun Xu (TU Delft), Andrea Continella (University of Twente) | |
Technical Session III: Beyond Detection: Pre-Analysis and Post-Infection Phases | |
A Unified Comparison of Tabular and Graph-Based Feature Representations in Machine Learning for Malware Detection
Samy Bettaieb (UCLouvain), Serena Lucca (UCLouvain), Charles-Henry Bertrand Van Ouytsel (UCLouvain), Axel Legay (Nexova), Etienne Rivière (UCLouvain) | |
Do Fear The REAPIR: Adversarial Malware From API Replacement
Luke Kurlandski (Rochester Institute of Technology), Rayan Mosli (King Abdulaziz University), Yin Pan (Rochester Institute of Technology), Sirapat Thianphan (Rochester Institute of Technology), Matthew Wright (Rochester Institute of Technology) |
Malware research is a discipline of information security that aims to provide protection against unwanted and dangerous software. Since the mid-1980s, researchers in this area have been leading a technological arms race against creators of malware. Many ideas have been proposed, to varying degrees of effectiveness, from more traditional systems security and program analysis to the use of AI and Machine Learning. Nevertheless, with increased technological complexity and despite more sophisticated defenses, malware’s impact has grown, rather than shrunk. It appears that the defenders are continually reacting to yesterday’s threats, only to be surprised by today's minor variations. The rise of Generative AI and Large Language models opens the path for new attackers strategies at reduced costs, and complicates the work for defenders.
This lack of robustness is most apparent in signature matching, where malware is represented by a characteristic substring. The fundamental limitation of this approach is its reliance on falsifiable evidence. Mutating the characteristic substring, i.e., falsifying the evidence, is effective in evading detection, and cheaper than discovering the substring in the first place. Unsurprisingly, the same limitation applies to malware detectors based on machine learning, as long as they rely on falsifiable features for decision-making. Robust malware features are necessary. Furthermore, robust methods for malware classification and analysis are needed across the board to overcome phenomena including, but not limited to, concept drift (malware evolution), polymorphism, new malware families, new anti-analysis techniques, and adversarial machine learning, while supporting robust explanations.
This workshop solicits work that aims to rethink how we conduct malware analysis, with the goal of creating long-term solutions to the threats of today’s digital environment. Potential research directions are malware detection, benchmark datasets, environments for malware arms race simulation, and exploring limitations of existing work, among others.
Topics of interest include (but are not limited to):
Bridging the Gap between Academia and Industry Topics related to addressing the disconnect that often exists between academic research and its practical application in real-world industry scenarios:We invite the following types of papers:
Submissions must be anonymous (double-blind review), and authors should refer to their previous work in the third person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings.
Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P: eurosp-template.zip. Please do not use other IEEE templates.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader XI and when printed in black and white.
Accepted papers will be published in IEEE Xplore. One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings. Committee members are not required to read the appendices, so the paper should be intelligible without them. Submissions must be in English.
Guidelines for Authors: We encourage authors to use any suitable tools, including Large Language Models (LLMs), for preparing high-quality papers. However, authors must adhere to three key criteria:
Guidelines for Reviewers: To protect the nature of the peer-review process, reviewers are expected to form their opinion about the paper and construct their feedback independently, i.e., without applying any automated analysis or reasoning tools to the workshop submissions. The reviewers are strictly disallowed to input the paper PDFs and text snippets from the reviewed paper into any AI-based tool, including LLMs and AI detection tools.
HotCrp Submission Website: https://submission.intellisec.de/worma-2025
The 3rd edition of WoRMA took place in 2024, co-located with IEEE EuroS&P in Vienna, Austria (https://worma.gitlab.io/2024/).
The 2nd edition of WoRMA took place in 2023, co-located with IEEE EuroS&P in Delft, Netherlands (https://worma.gitlab.io/2023/).
The 1st edition of WoRMA took place in 2022, co-located with AsiaCCS in Nagasaki, Japan (https://worma.gitlab.io/2022/).