Star 0

Talks

Title Humans
Last-minute paper: Hide and seek - how targeted attacks hide behind clean applications Sophos
Beyond testing: what really matters (sponsor presentation)
The global impact of anti-malware protection state on infection rates Microsoft Corporation
An automatic analysis and detection tool for Java exploits Palo Alto Networks
Make it tight, protect with might, and try not to hurt anyone Microsoft Corporation
Last-minute paper: Working together to defeat attacks against AV automation Microsoft Corporation
Last-minute paper: Lessons learned: sinkholing a peer-to-peer botnet Symantec
The Moroccan phishing cluster
Classifying PUAs in the mobile environment Sophos
Back channels and bitcoins: ZeroAccess' secret C&C communications Sophos
Billion dollar botnets Symantec
Operation Crossbill: how the police cracked an international malware gang
Last-minute paper: Hassle with Hesperbot: a new, sophisticated and very active banking trojan Robert Lipovsky , Anton Cherepanov , ESET
Hacking Team and Gamma International in 'business-to-government malware' Kaspersky Lab
A panoply of protection: new security and anti-malware measures in AutoCAD Microsoft Corporation , Autodesk
Last-minute paper: Reveal the facts behind the DDoS attack Kyle Yang , Fortinet, Inc.
Surviving 0-days - reducing the window of exposure Andreas Lindh
Embedding malware on websites using executable webserver files Evgeny Sidorov , Yandex
Statistically effective protection against APT attacks F-Secure
Analysis of Android in-app advertisement kits Axelle Apvrille , Fortinet, Inc.
'I am not the D'r.0,1d you are looking for': an analysis of Android malware obfuscation
PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file) Fabio Assolini , Kaspersky Lab
IEEE clean file metadata exchange Igor Muttik , Symantec , McAfee
Using statistical analysis of DNS traffic to identify infections of unknown malware
Pentesting with live malware Gunter Ollmann , IOActive, Inc.
Digging into Facebook ads: finding clues that indicate a scam pattern Bitdefender
The ransomware strikes back Bitdefender
RPZ: defending against malware via DNS
GinMaster : a case study in Android malware Sophos
In-memory ROP payload detection Justin Kim , Microsoft Corporation
Targeted attacks against Chinese online card games (sponsor presentation) Qihoo 360
Real-world testing, the good, the bad, and the ugly McAfee
Deciphering and mitigating Blackhole spam from email-borne threats Symantec
Panel discussion: Collateral damage in the age of cyber-warfare
Last-minute paper: Open DNS resolvers are to DDoS what open SMTP relays are to spam CloudFlare
Big bang theory of CVE-2012-4792 Avast Software
Trapping unknown malware in a context web Sophos
Behavioural detection of HTTP-based botnets McAfee
Hypervisor-based, hardware-assisted system monitoring Ralf Hund , Ruhr University Bochum
The best things in life are free (sponsor presentation)
Are Linux desktop systems threatened by trojans?
Infection vector: cyberspace junk, waste, and zombies Microsoft Corporation
The Real Time Threat List ESET
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
What can Big Data Security learn from the AV industry? (sponsor presentation) ESET
A meta-analysis of recent malware tests
Security research and development framework
Can alerting the public about exploitation do more harm than good? Tom Cross , Holly Stewart , Lancope , Microsoft Corporation
Windows 8 SmartScreen application control - what more could you ask for?
Last-minute paper: Android - practical security from the ground up Adrian Ludwig , Google Inc.
Google and Apple markets: are their applications really secure?! Bitdefender
Keynote: Ethics and the AV industry in the age of WikiLeaks Andrew Lee , ESET
Between an RTF and OLE2 place: an analysis of CVE-2012-0158 samples Sophos
Malicious redirection of mobile users Kaspersky Lab
Targeted social engineering attacks. Sensitive information, from a theoretical concept to a culturally defined notion
Tinba v2 Trend Micro, Inc.
What I learned from 'See Spot, see Spot run' (or the many mistakes I've made publishing malware information for users and how you can avoid them)
Mac hacking: the way to better testing? ESET , Intego