Star 0

Talks

Title Humans
Affiliate web-based malware Sophos
Last-minute presentation: Recent rogueware
Last-minute presentation: Apple iPhone programming with SDK McAfee
Mapping and understanding extinction patterns for viruses and worms over 15 years
The NorTel Mailer: effective open-source spam filtering for enterprises
The malware business Kaspersky Lab
Towards integrated malware defence
Last-minute presentation: Last-minute malicious packer dissected
Who will test the testers? Andrew Lee , ESET
Life beyond outbreaks - marketing in today's threat environment
VCC - Virus Control Center: a home-grown helpdesk application to efficiently handle the never-ending flood of malware
Panel discussion: The state of anti-malware testing Sophos
Report card on a network based anti-worm defence system
Applying user-mode memory scanning on Windows NT
Last-minute presentation: VB testing - present status, future plans
Understanding and teaching bots and botnets ESET
Where do your users want to go today and can you stop them?
Intentions of capitalistic malware Holly Stewart , Gunter Ollmann , IBM
Graph, entropy and grid computing: automatic comparison of malware
SCADA security - who is really in control of our control systems? IBM
Russian spammers: the view from Russia Kaspersky Lab
Network access control technologies
Samples.malware.org: sample sharing for the next decade?
Last-minute presentation: There is (some) honour among South American authors of infostealer trojans! McAfee
Keynote address: The AV industry: Quo Vadis?
Packer visualisation: a fast entropy scanning algorithm that preserves local detail
The robustness of new email identification standards
Taxonomy of web-based malware - finding rules for heuristic detection Sophos
A look at defence in depth
Malware forensics: detecting the unknown IBM
Darwin inside the machines: malware evolution and the consequences for computer security Symantec
Here comes the flood/end of the pattern file Trend Micro, Inc.
Rebuilding testing for the future Igor Muttik , McAfee
Last-minute presentation: URLCheck: malware and phishing URL aggregator
Security in banking forum
Automatic rules-based binary analysis with IDA Pro and CLIPS
Coordinated distributions method for tracking botnets sending out spam Kaspersky Lab
Game-theoretic framework to assess attack-resistance of an AV system Arun Lakhotia , University of Louisiana at Lafayette
Last-minute presentation: P0wn the cloud. The good, the bad, and the pugly of cloud computing Dan Hubbard
Playing with shadows - exposing the black market for online game password theft Microsoft Corporation
Clean data profiling Symantec
Using throttling and traffic shaping to combat botnet spam
Non-English spam: a case study Proofpoint
Last-minute presentation: Race to zero with online scanners Sophos
Stormy Weather: a quantitative assessment of the Storm web threat in 2007 Trend Micro, Inc.
Malware development life cycle Microsoft Corporation
The name of the dose: does malware naming still matter? Pierre-Marc Bureau , ESET
Your computer is now stoned (...again!). The rise of MBR rootkits Elia Florio , F-Secure , Symantec
How secure is your virtualized network? Joshua Corman , IBM
When the hammer falls - effects of successful widespread disinfection on malware development and direction Microsoft Corporation