Last-minute paper: Hide and seek - how targeted attacks hide behind clean applications
|
Sophos
|
Beyond testing: what really matters (sponsor presentation)
|
|
The global impact of anti-malware protection state on infection rates
|
Microsoft Corporation
|
An automatic analysis and detection tool for Java exploits
|
Palo Alto Networks
|
Make it tight, protect with might, and try not to hurt anyone
|
Microsoft Corporation
|
Last-minute paper: Working together to defeat attacks against AV automation
|
Microsoft Corporation
|
Last-minute paper: Lessons learned: sinkholing a peer-to-peer botnet
|
Symantec
|
The Moroccan phishing cluster
|
|
Classifying PUAs in the mobile environment
|
Sophos
|
Back channels and bitcoins: ZeroAccess' secret C&C communications
|
Sophos
|
Billion dollar botnets
|
Symantec
|
Operation Crossbill: how the police cracked an international malware gang
|
|
Last-minute paper: Hassle with Hesperbot: a new, sophisticated and very active banking trojan
|
Robert Lipovsky
,
Anton Cherepanov
,
ESET
|
Hacking Team and Gamma International in 'business-to-government malware'
|
Kaspersky Lab
|
A panoply of protection: new security and anti-malware measures in AutoCAD
|
Microsoft Corporation
,
Autodesk
|
Last-minute paper: Reveal the facts behind the DDoS attack
|
Kyle Yang
,
Fortinet, Inc.
|
Surviving 0-days - reducing the window of exposure
|
Andreas Lindh
|
Embedding malware on websites using executable webserver files
|
Evgeny Sidorov
,
Yandex
|
Statistically effective protection against APT attacks
|
F-Secure
|
Analysis of Android in-app advertisement kits
|
Axelle Apvrille
,
Fortinet, Inc.
|
'I am not the D'r.0,1d you are looking for': an analysis of Android malware obfuscation
|
|
PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file)
|
Fabio Assolini
,
Kaspersky Lab
|
IEEE clean file metadata exchange
|
Igor Muttik
,
Symantec
,
McAfee
|
Using statistical analysis of DNS traffic to identify infections of unknown malware
|
|
Pentesting with live malware
|
Gunter Ollmann
,
IOActive, Inc.
|
Digging into Facebook ads: finding clues that indicate a scam pattern
|
Bitdefender
|
The ransomware strikes back
|
Bitdefender
|
RPZ: defending against malware via DNS
|
|
GinMaster : a case study in Android malware
|
Sophos
|
In-memory ROP payload detection
|
Justin Kim
,
Microsoft Corporation
|
Targeted attacks against Chinese online card games (sponsor presentation)
|
Qihoo 360
|
Real-world testing, the good, the bad, and the ugly
|
McAfee
|
Deciphering and mitigating Blackhole spam from email-borne threats
|
Symantec
|
Panel discussion: Collateral damage in the age of cyber-warfare
|
|
Last-minute paper: Open DNS resolvers are to DDoS what open SMTP relays are to spam
|
CloudFlare
|
Big bang theory of CVE-2012-4792
|
Avast Software
|
Trapping unknown malware in a context web
|
Sophos
|
Behavioural detection of HTTP-based botnets
|
McAfee
|
Hypervisor-based, hardware-assisted system monitoring
|
Ralf Hund
,
Ruhr University Bochum
|
The best things in life are free (sponsor presentation)
|
|
Are Linux desktop systems threatened by trojans?
|
|
Infection vector: cyberspace junk, waste, and zombies
|
Microsoft Corporation
|
The Real Time Threat List
|
ESET
|
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
|
|
What can Big Data Security learn from the AV industry? (sponsor presentation)
|
ESET
|
A meta-analysis of recent malware tests
|
|
Security research and development framework
|
|
Can alerting the public about exploitation do more harm than good?
|
Tom Cross
,
Holly Stewart
,
Lancope
,
Microsoft Corporation
|
Windows 8 SmartScreen application control - what more could you ask for?
|
|
Last-minute paper: Android - practical security from the ground up
|
Adrian Ludwig
,
Google Inc.
|
Google and Apple markets: are their applications really secure?!
|
Bitdefender
|
Keynote: Ethics and the AV industry in the age of WikiLeaks
|
Andrew Lee
,
ESET
|
Between an RTF and OLE2 place: an analysis of CVE-2012-0158 samples
|
Sophos
|
Malicious redirection of mobile users
|
Kaspersky Lab
|
Targeted social engineering attacks. Sensitive information, from a theoretical concept to a culturally defined notion
|
|
Tinba v2
|
Trend Micro, Inc.
|
What I learned from 'See Spot, see Spot run' (or the many mistakes I've made publishing malware information for users and how you can avoid them)
|
|
Mac hacking: the way to better testing?
|
ESET
,
Intego
|