Formal model proposal for (malware) program stealth
|
Eric Filiol
|
Browsing the deeps - a look into malware in the web
|
|
Menace 2 the wires: advances in the business models of cybercriminals
|
Fortinet, Inc.
|
Continual feature selection: a cost effective method for enhancing the capabilities of enterprise spam solutions
|
Proofpoint
|
Have you got anything without spam in it?
|
CA
|
A testing methodology for rootkit removal effectiveness
|
Symantec
|
Once upon a time a trojan...
|
|
Pimp my PE: taming malicious and malformed executables
|
|
Unpacking PE files on Windows Mobile
|
|
The WildList is dead, long live the WildList!
|
|
Patching. Is it always with the best intentions?
|
McAfee
|
Last-minute presentation: Can you trust your DNS? A case study of a large-scale rogue DNS network
|
Feike Hacquebord
,
Erik Wu
,
Trend Micro, Inc.
|
Hurricane approach: 'false Positive' whens, not ifs
|
|
Last-minute presentation: Phylogenetic comparisons of malware
|
University of Louisiana at Lafayette
|
The trojan money spinner
|
F-Secure
|
Anti-rootkit safeguards: welcome Vista
|
|
eSWAT: a spyware-resistant virtual keyboard
|
|
Last-minute presentation: Terminating hidden processes
|
McAfee
|
Malware removal - beyond content and context scanning
|
|
Pump-n-dump for fun & profit: an in-depth look into stock spam and brokerage account compromise operations
|
|
Last-minute presentation: Novel code obfuscation with COM
|
IBM
|
What a waste - the AV community DoS-ing itself
|
McAfee
|
New approaches to categorising economically-motivated digital threats
|
Trend Micro, Inc.
|
Virusability of modern mobile environments
|
|
Transforming victims into cyber-border guards: education as a defence strategy
|
Microsoft Corporation
|
The journey so far: trends, graphs and statistics
|
|
Anti-malware expert system
|
|
The strange case of Julie Amero
|
|
Application control for malware protection
|
Sophos
|
Playing dirty: evolving security threats in the gaming world
|
CA
|
A deeper look at malware - the whole story
|
Fortinet, Inc.
|
The Spammers' Compendium: five years on
|
|
Last-minute presentation: Storm - Malware 2.0 has arrived
|
|
Virus linguistics - searching for ethnic words
|
Symantec
|
Phish phodder: is user education helping or hindering?
|
Andrew Lee
|
Last-minute presentation: Targeted Banker malware on demand
|
Kaspersky Lab
|
Application forensics
|
CA
|
Future threats
|
John Aycock
|
Detecting spam pictures using statistical features
|
|
Last-minute presentation: High-speed image part recognition
|
|
Insecurity and malware in virtual universes
|
IBM
|
A road to big money: evolution of automation methods in malware development
|
|
The marriage of spam and malware: Implications for SMTP malware defence
|
|
Apple Media Files and iPhone
|
McAfee
|
Changing battleground: security against targeted, low-profile attacks
|
|
Panel discussion: The fight against international cyber crime - enforcing the law
|
FBI
|
Last-minute presentation: A 'sting operation' to fool suspected threats
|
|
Stopping malware at the gateway: challenges and solutions
|
|
DSD Tracer - implementation and experimentation
|
Sophos
|