Star 0

Talks

Title Humans
From drive-by download to drive-by mining: understanding the new paradigm
PUPs: a tale about consumers, money and data (partner presentation)
Unpacking the packed unpacker: reversing an Android anti-analysis library Maddie Stone
Since the hacking of Sony Pictures
The botnet landscape - live threats and steps for mitigation
Triada: the past, the present and the (hopefully not existing) future
From Hacking Team to hacked team to…?
Foreverdays: tracking and mitigating threats targeting civil society orgs
An industry approach for unwanted software criteria and clean requirements
An international 'who-cares-ometer' for cybercrime (partner presentation)
Workshop: Manual kernel mode malware analysis Cisco Talos Group
Anatomy of an attack: detecting and defeating CRASHOVERRIDE Joe Slowik
Artificial intelligence to assist with ransomware cryptanalysis
ARS VBS Loader: ‘cause size doesn’t matter (right?) Jose Miguel Esparza
The Hitchhiker’s Guide to the North Korean malware galaxy Jay Rosenberg , Intezer Labs
Dangerous comeback: fighting ever-changing macro threats (VB2018 partner presentation)
Fire & ice: making and breaking macOS firewalls Patrick Wardle , Digita Security
Cost of pwnership: how black market tools and services facilitate the operation of cybercriminal enterprises
Explain Ethereum smart contract hacking like I am five Zoltan Balazs , MRG Effitas
Workshop: Android malware reverse engineering for the brave Axelle Apvrille
Levelling up: why sharing threat intelligence makes you more competitive
Botception: hire a botnet to spread one's own botnet
Tracking Mirai variants
Nomadic Octopus: cyber espionage in Central Asia Anton Cherepanov
Exploiting ActionScript3 interpreter Boris Larin , Anton Ivanov
Fake News, Inc. Andrew Brandt
DNS tunnelling: that's not your grandma's exfil Brad Antoniewicz , Cisco Umbrella
The modality of mortality in domain names Paul Vixie , Farsight Security
Behind the scenes of the SamSam investigation Andrew Brandt
Lazarus Group: one mahjong game played with different sets of tiles
Who wasn’t responsible for Olympic Destroyer? Paul Rascagneres , Cisco Talos Group
Windows Defender under the microscope: a reverse engineer's perspective Alexei Bulazel
Now you see it, now you don't: wipers in the wild BAE Systems
The Big Bang Theory by APT-C-23
Android app deobfuscation using static-dynamic cooperation
Starving malware authors through dynamic classification Microsoft Corporation
Draw me like one of your French APTs – expanding our descriptive palette for digital threat actors
Code signing flaw in macOS
U2Fishing: potential security threat introduced by U2F key wrapping mechanism Wang Kang , Alibaba Group Holding Limited
Internet balkanization: why are we raising borders online?
Hide'n'Seek: an adaptive peer-to-peer IoT botnet
The wolf in sheep's clothing - undressed
Inside Formbook infostealer
Workshop: AI in cybersecurity
Little Brother is watching - we know all your secrets! Siegfried Rasthofer , Stephan Huber , Steven Arzt , Fraunhofer SIT
Office bugs on the rise
Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived
The role of malware in intelligence operations (partner presentation) Kenneth Geers
DOKKAEBI: Documents of Korean and Evil Binary Min-Chang Jang
VBA + AMSI: evening the score with macro malware Microsoft Corporation
Shedding skin - Turla's fresh faces
Analysing compiled binaries using logic F-Secure
The missing link in the chain? Android network analysis
Under the hood - the automotive challenge Inbar Raz
Tricky sample? Hack it easy! Applying dynamic binary instrumentation to lightweight malware behaviour analysis Maksim Shudrak
Where have all the good hires gone?
Uncovering the wholesale industry of social media fraud: from botnet to bulk reseller panels Masarah Paquet-Clouston
Security issues of IoV devices Trend Micro, Inc.