Star 0

Talks

Title Humans
Formal model proposal for (malware) program stealth Eric Filiol
Browsing the deeps - a look into malware in the web
Menace 2 the wires: advances in the business models of cybercriminals Fortinet, Inc.
Continual feature selection: a cost effective method for enhancing the capabilities of enterprise spam solutions Proofpoint
Have you got anything without spam in it? CA
A testing methodology for rootkit removal effectiveness Symantec
Once upon a time a trojan...
Pimp my PE: taming malicious and malformed executables
Unpacking PE files on Windows Mobile
The WildList is dead, long live the WildList!
Patching. Is it always with the best intentions? McAfee
Last-minute presentation: Can you trust your DNS? A case study of a large-scale rogue DNS network Feike Hacquebord , Erik Wu , Trend Micro, Inc.
Hurricane approach: 'false Positive' whens, not ifs
Last-minute presentation: Phylogenetic comparisons of malware University of Louisiana at Lafayette
The trojan money spinner F-Secure
Anti-rootkit safeguards: welcome Vista
eSWAT: a spyware-resistant virtual keyboard
Last-minute presentation: Terminating hidden processes McAfee
Malware removal - beyond content and context scanning
Pump-n-dump for fun & profit: an in-depth look into stock spam and brokerage account compromise operations
Last-minute presentation: Novel code obfuscation with COM IBM
What a waste - the AV community DoS-ing itself McAfee
New approaches to categorising economically-motivated digital threats Trend Micro, Inc.
Virusability of modern mobile environments
Transforming victims into cyber-border guards: education as a defence strategy Microsoft Corporation
The journey so far: trends, graphs and statistics
Anti-malware expert system
The strange case of Julie Amero
Application control for malware protection Sophos
Playing dirty: evolving security threats in the gaming world CA
A deeper look at malware - the whole story Fortinet, Inc.
The Spammers' Compendium: five years on
Last-minute presentation: Storm - Malware 2.0 has arrived
Virus linguistics - searching for ethnic words Symantec
Phish phodder: is user education helping or hindering? Andrew Lee
Last-minute presentation: Targeted Banker malware on demand Kaspersky Lab
Application forensics CA
Future threats John Aycock
Detecting spam pictures using statistical features
Last-minute presentation: High-speed image part recognition
Insecurity and malware in virtual universes IBM
A road to big money: evolution of automation methods in malware development
The marriage of spam and malware: Implications for SMTP malware defence
Apple Media Files and iPhone McAfee
Changing battleground: security against targeted, low-profile attacks
Panel discussion: The fight against international cyber crime - enforcing the law FBI
Last-minute presentation: A 'sting operation' to fool suspected threats
Stopping malware at the gateway: challenges and solutions
DSD Tracer - implementation and experimentation Sophos