Last-minute paper: BGP - From Route Hijacking to RPKI: How Vulnerable is the Internet?
|
|
Neverquest: Crime as a Service and On the Hunt for the Big Bucks
|
|
Real-Time Static Analysis: Detecting Zero-Day Ransomware Campaigns
|
|
Unveiling the Attack Chain of Russian-Speaking Cybercriminals
|
Wayne Huang
,
Sun Huang
|
Beware! Zombies are Coming
|
Zhi Xu
,
Tongbo Luo
,
Cong Zheng
,
Palo Alto Networks
|
BlackEnergy – What We Really Know About the Notorious Cyber Attacks
|
Robert Lipovsky
,
Anton Cherepanov
|
Last-minute paper: A Malicious OS X Cocktail Served from a Tainted Bottle
|
|
Locky Strike: Smoking the Locky Ransomware Code
|
|
Mobile Applications: a Backdoor into Internet of Things?
|
Axelle Apvrille
|
The Clean Software Alliance: the Enforcement Perspective
|
|
Smart Outlets. Why We Need Responsible Disclosure!
|
|
Breach Detection, Protection and Response Testing: The Next-Gen Approach
|
|
“$ echo Internet $>_...”: Towards Practical Internet-wide Probing and Crawling
|
Zhaoyan Xu
,
Palo Alto Networks
|
Last-minute paper: Nymaim: the Untold Story
|
|
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in your Virtualized Environment
|
Check Point Software Technologies
|
Last-minute paper: Getting Duped: Piggybacking on Webcam Streams for Surreptitious Recordings
|
Patrick Wardle
|
Attack Psychology – Using Behaviour to Identify Threats (sponsor presentation)
|
|
IEEE Anti-Malware Support Service
|
|
All Your Creds Are Belong To Us
|
|
Anti-malware Testing Undercover
|
|
One-Click Fileless Infection
|
|
Debugging and Monitoring Malware Network Activities with Haka
|
|
Professional Phishers and Their Habits
|
|
Open Source Malware Lab
|
|
Diving into Pinkslipbot's Latest Campaign
|
Intel Security
|
(In-) Security of Smartphone AntiVirus and Security Apps
|
Stephan Huber
,
Siegfried Rasthofer
,
Fraunhofer SIT
|
Operation Sentry Stopper: A Long-Standing Cyber Espionage
|
Trend Micro, Inc.
|
APT Reports and OPSEC Evolution, or: These Are Not the APT Reports You Are Looking For
|
Gadi Evron
,
Inbar Raz
|
The Tor Project
|
The Tor Project
|
Building a Local PassiveDNS Capability for Malware Incident Response
|
|
Detecting Man in the Middle Attacks With Canary Requests
|
Brian Wallace
|
Automating Visibility into User Behaviour Vulnerabilities to Malware Attack
|
|
Mind This Gap: Criminal Hacking and the Global Cybersecurity Skills Shortage, a Critical Analysis
|
|
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
|
|
Trusted Code Execution on Untrusted Platform Using Intel SGX
|
Northeastern University
|
The Chinese Underground Economy: the Hook007 Group
|
Qihoo 360
|
Inside Exploit Kits
|
John Bambenek
|
Security Challenges in Healthcare
|
|
Trusted code signing abuse by malware and their exploitation of the CA verification process (sponsor presentation)
|
Geoff McDonald
,
Microsoft Corporation
|
Uncovering The Secrets Of Malvertising
|
|
Last-minute paper: The Beginning of the End(point): Where we are now and where we'll be in five years
|
|
The Elknot DDoS Botnets We Watched
|
Qihoo 360
|
Modern Attacks on Russian Financial Institutions
|
Anton Cherepanov
,
Jean-Ian Boutin
|
The Good, The bad & The Ugly: The Advertiser, the Bot & the Traffic Broker
|
Matthieu Faou
,
Joan Calvet
,
Pierre-Marc Bureau
|
Android Security
|
|
Last-minute paper: On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
|
|
Last-minute paper: Challenges and Approaches of Cracking Ransomware
|
|
Diving into Malware’s Furtive Plumbing
|
Or Safran
|
Using Machine Learning to Stop Exploit Kits In-Line in Real-Time
|
Brandon Niemczyk
|
Wild Android Collusions
|
Intel Security
|
GPS Attacks on a 'Shoe String': Methods of Analysis and Countermeasures
|
|
Exploit Millions of Pebble Smartwatches for Fun and Profit
|
Yulong Zhang
,
Lenx Wei
,
Baidu Security Lab
|
Great Crypto Failures
|
Yaniv Balmas
,
Check Point Software Technologies
|
Last-minute paper: Malicious Proxy auto-configs: An Easy Way to Harvest Banking Credentials
|
|
Automatic Classifying of Mac OS X Samples
|
Trend Micro, Inc.
|
SBDH Espionage Toolkit (sponsor presentation)
|
|
Are They Real? Real-Life Comparative Tests of Anti-Virus Products
|
Microsoft Corporation
|