Affiliate web-based malware
|
Sophos
|
Last-minute presentation: Recent rogueware
|
|
Last-minute presentation: Apple iPhone programming with SDK
|
McAfee
|
Mapping and understanding extinction patterns for viruses and worms over 15 years
|
|
The NorTel Mailer: effective open-source spam filtering for enterprises
|
|
The malware business
|
Kaspersky Lab
|
Towards integrated malware defence
|
|
Last-minute presentation: Last-minute malicious packer dissected
|
|
Who will test the testers?
|
Andrew Lee
,
ESET
|
Life beyond outbreaks - marketing in today's threat environment
|
|
VCC - Virus Control Center: a home-grown helpdesk application to efficiently handle the never-ending flood of malware
|
|
Panel discussion: The state of anti-malware testing
|
Sophos
|
Report card on a network based anti-worm defence system
|
|
Applying user-mode memory scanning on Windows NT
|
|
Last-minute presentation: VB testing - present status, future plans
|
|
Understanding and teaching bots and botnets
|
ESET
|
Where do your users want to go today and can you stop them?
|
|
Intentions of capitalistic malware
|
Holly Stewart
,
Gunter Ollmann
,
IBM
|
Graph, entropy and grid computing: automatic comparison of malware
|
|
SCADA security - who is really in control of our control systems?
|
IBM
|
Russian spammers: the view from Russia
|
Kaspersky Lab
|
Network access control technologies
|
|
Samples.malware.org: sample sharing for the next decade?
|
|
Last-minute presentation: There is (some) honour among South American authors of infostealer trojans!
|
McAfee
|
Keynote address: The AV industry: Quo Vadis?
|
|
Packer visualisation: a fast entropy scanning algorithm that preserves local detail
|
|
The robustness of new email identification standards
|
|
Taxonomy of web-based malware - finding rules for heuristic detection
|
Sophos
|
A look at defence in depth
|
|
Malware forensics: detecting the unknown
|
IBM
|
Darwin inside the machines: malware evolution and the consequences for computer security
|
Symantec
|
Here comes the flood/end of the pattern file
|
Trend Micro, Inc.
|
Rebuilding testing for the future
|
Igor Muttik
,
McAfee
|
Last-minute presentation: URLCheck: malware and phishing URL aggregator
|
|
Security in banking forum
|
|
Automatic rules-based binary analysis with IDA Pro and CLIPS
|
|
Coordinated distributions method for tracking botnets sending out spam
|
Kaspersky Lab
|
Game-theoretic framework to assess attack-resistance of an AV system
|
Arun Lakhotia
,
University of Louisiana at Lafayette
|
Last-minute presentation: P0wn the cloud. The good, the bad, and the pugly of cloud computing
|
Dan Hubbard
|
Playing with shadows - exposing the black market for online game password theft
|
Microsoft Corporation
|
Clean data profiling
|
Symantec
|
Using throttling and traffic shaping to combat botnet spam
|
|
Non-English spam: a case study
|
Proofpoint
|
Last-minute presentation: Race to zero with online scanners
|
Sophos
|
Stormy Weather: a quantitative assessment of the Storm web threat in 2007
|
Trend Micro, Inc.
|
Malware development life cycle
|
Microsoft Corporation
|
The name of the dose: does malware naming still matter?
|
Pierre-Marc Bureau
,
ESET
|
Your computer is now stoned (...again!). The rise of MBR rootkits
|
Elia Florio
,
F-Secure
,
Symantec
|
How secure is your virtualized network?
|
Joshua Corman
,
IBM
|
When the hammer falls - effects of successful widespread disinfection on malware development and direction
|
Microsoft Corporation
|