From drive-by download to drive-by mining: understanding the new paradigm
|
|
PUPs: a tale about consumers, money and data (partner presentation)
|
|
Unpacking the packed unpacker: reversing an Android anti-analysis library
|
Maddie Stone
|
Since the hacking of Sony Pictures
|
|
The botnet landscape - live threats and steps for mitigation
|
|
Triada: the past, the present and the (hopefully not existing) future
|
|
From Hacking Team to hacked team to…?
|
|
Foreverdays: tracking and mitigating threats targeting civil society orgs
|
|
An industry approach for unwanted software criteria and clean requirements
|
|
An international 'who-cares-ometer' for cybercrime (partner presentation)
|
|
Workshop: Manual kernel mode malware analysis
|
Cisco Talos Group
|
Anatomy of an attack: detecting and defeating CRASHOVERRIDE
|
Joe Slowik
|
Artificial intelligence to assist with ransomware cryptanalysis
|
|
ARS VBS Loader: ‘cause size doesn’t matter (right?)
|
Jose Miguel Esparza
|
The Hitchhiker’s Guide to the North Korean malware galaxy
|
Jay Rosenberg
,
Intezer Labs
|
Dangerous comeback: fighting ever-changing macro threats (VB2018 partner presentation)
|
|
Fire & ice: making and breaking macOS firewalls
|
Patrick Wardle
,
Digita Security
|
Cost of pwnership: how black market tools and services facilitate the operation of cybercriminal enterprises
|
|
Explain Ethereum smart contract hacking like I am five
|
Zoltan Balazs
,
MRG Effitas
|
Workshop: Android malware reverse engineering for the brave
|
Axelle Apvrille
|
Levelling up: why sharing threat intelligence makes you more competitive
|
|
Botception: hire a botnet to spread one's own botnet
|
|
Tracking Mirai variants
|
|
Nomadic Octopus: cyber espionage in Central Asia
|
Anton Cherepanov
|
Exploiting ActionScript3 interpreter
|
Boris Larin
,
Anton Ivanov
|
Fake News, Inc.
|
Andrew Brandt
|
DNS tunnelling: that's not your grandma's exfil
|
Brad Antoniewicz
,
Cisco Umbrella
|
The modality of mortality in domain names
|
Paul Vixie
,
Farsight Security
|
Behind the scenes of the SamSam investigation
|
Andrew Brandt
|
Lazarus Group: one mahjong game played with different sets of tiles
|
|
Who wasn’t responsible for Olympic Destroyer?
|
Paul Rascagneres
,
Cisco Talos Group
|
Windows Defender under the microscope: a reverse engineer's perspective
|
Alexei Bulazel
|
Now you see it, now you don't: wipers in the wild
|
BAE Systems
|
The Big Bang Theory by APT-C-23
|
|
Android app deobfuscation using static-dynamic cooperation
|
|
Starving malware authors through dynamic classification
|
Microsoft Corporation
|
Draw me like one of your French APTs – expanding our descriptive palette for digital threat actors
|
|
Code signing flaw in macOS
|
|
U2Fishing: potential security threat introduced by U2F key wrapping mechanism
|
Wang Kang
,
Alibaba Group Holding Limited
|
Internet balkanization: why are we raising borders online?
|
|
Hide'n'Seek: an adaptive peer-to-peer IoT botnet
|
|
The wolf in sheep's clothing - undressed
|
|
Inside Formbook infostealer
|
|
Workshop: AI in cybersecurity
|
|
Little Brother is watching - we know all your secrets!
|
Siegfried Rasthofer
,
Stephan Huber
,
Steven Arzt
,
Fraunhofer SIT
|
Office bugs on the rise
|
|
Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived
|
|
The role of malware in intelligence operations (partner presentation)
|
Kenneth Geers
|
DOKKAEBI: Documents of Korean and Evil Binary
|
Min-Chang Jang
|
VBA + AMSI: evening the score with macro malware
|
Microsoft Corporation
|
Shedding skin - Turla's fresh faces
|
|
Analysing compiled binaries using logic
|
F-Secure
|
The missing link in the chain? Android network analysis
|
|
Under the hood - the automotive challenge
|
Inbar Raz
|
Tricky sample? Hack it easy! Applying dynamic binary instrumentation to lightweight malware behaviour analysis
|
Maksim Shudrak
|
Where have all the good hires gone?
|
|
Uncovering the wholesale industry of social media fraud: from botnet to bulk reseller panels
|
Masarah Paquet-Clouston
|
Security issues of IoV devices
|
Trend Micro, Inc.
|