Star 0

Talks

Title Humans
Last-minute paper: BGP - From Route Hijacking to RPKI: How Vulnerable is the Internet?
Neverquest: Crime as a Service and On the Hunt for the Big Bucks
Real-Time Static Analysis: Detecting Zero-Day Ransomware Campaigns
Unveiling the Attack Chain of Russian-Speaking Cybercriminals Wayne Huang , Sun Huang
Beware! Zombies are Coming Zhi Xu , Tongbo Luo , Cong Zheng , Palo Alto Networks
BlackEnergy – What We Really Know About the Notorious Cyber Attacks Robert Lipovsky , Anton Cherepanov
Last-minute paper: A Malicious OS X Cocktail Served from a Tainted Bottle
Locky Strike: Smoking the Locky Ransomware Code
Mobile Applications: a Backdoor into Internet of Things? Axelle Apvrille
The Clean Software Alliance: the Enforcement Perspective
Smart Outlets. Why We Need Responsible Disclosure!
Breach Detection, Protection and Response Testing: The Next-Gen Approach
“$ echo Internet $>_...”: Towards Practical Internet-wide Probing and Crawling Zhaoyan Xu , Palo Alto Networks
Last-minute paper: Nymaim: the Untold Story
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in your Virtualized Environment Check Point Software Technologies
Last-minute paper: Getting Duped: Piggybacking on Webcam Streams for Surreptitious Recordings Patrick Wardle
Attack Psychology – Using Behaviour to Identify Threats (sponsor presentation)
IEEE Anti-Malware Support Service
All Your Creds Are Belong To Us
Anti-malware Testing Undercover
One-Click Fileless Infection
Debugging and Monitoring Malware Network Activities with Haka
Professional Phishers and Their Habits
Open Source Malware Lab
Diving into Pinkslipbot's Latest Campaign Intel Security
(In-) Security of Smartphone AntiVirus and Security Apps Stephan Huber , Siegfried Rasthofer , Fraunhofer SIT
Operation Sentry Stopper: A Long-Standing Cyber Espionage Trend Micro, Inc.
APT Reports and OPSEC Evolution, or: These Are Not the APT Reports You Are Looking For Gadi Evron , Inbar Raz
The Tor Project The Tor Project
Building a Local PassiveDNS Capability for Malware Incident Response
Detecting Man in the Middle Attacks With Canary Requests Brian Wallace
Automating Visibility into User Behaviour Vulnerabilities to Malware Attack
Mind This Gap: Criminal Hacking and the Global Cybersecurity Skills Shortage, a Critical Analysis
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
Trusted Code Execution on Untrusted Platform Using Intel SGX Northeastern University
The Chinese Underground Economy: the Hook007 Group Qihoo 360
Inside Exploit Kits John Bambenek
Security Challenges in Healthcare
Trusted code signing abuse by malware and their exploitation of the CA verification process (sponsor presentation) Geoff McDonald , Microsoft Corporation
Uncovering The Secrets Of Malvertising
Last-minute paper: The Beginning of the End(point): Where we are now and where we'll be in five years
The Elknot DDoS Botnets We Watched Qihoo 360
Modern Attacks on Russian Financial Institutions Anton Cherepanov , Jean-Ian Boutin
The Good, The bad & The Ugly: The Advertiser, the Bot & the Traffic Broker Matthieu Faou , Joan Calvet , Pierre-Marc Bureau
Android Security
Last-minute paper: On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
Last-minute paper: Challenges and Approaches of Cracking Ransomware
Diving into Malware’s Furtive Plumbing Or Safran
Using Machine Learning to Stop Exploit Kits In-Line in Real-Time Brandon Niemczyk
Wild Android Collusions Intel Security
GPS Attacks on a 'Shoe String': Methods of Analysis and Countermeasures
Exploit Millions of Pebble Smartwatches for Fun and Profit Yulong Zhang , Lenx Wei , Baidu Security Lab
Great Crypto Failures Yaniv Balmas , Check Point Software Technologies
Last-minute paper: Malicious Proxy auto-configs: An Easy Way to Harvest Banking Credentials
Automatic Classifying of Mac OS X Samples Trend Micro, Inc.
SBDH Espionage Toolkit (sponsor presentation)
Are They Real? Real-Life Comparative Tests of Anti-Virus Products Microsoft Corporation