Botnet-powered SQL injection attacks: a deeper look within
|
Fortinet, Inc.
|
Detecting malicious documents with combined static and dynamic analysis
|
Thorsten Holz
|
'I am not a numero!': assessing global security threat levels
|
Fortinet, Inc.
|
Last-minute presentation: WebStalker - detection of malicious web pages through monitoring web browser behaviour
|
|
Anti-Malware Testing Standards Organization (AMTSO): the status right now
|
|
Last-minute presentation: My Bots Are Not Yours! A case study of 600+ real-world living botnets
|
Erik Wu
,
Gunter Ollmann
|
PE-probe: leveraging packer detection and structural information to detect malicious portable executables
|
|
Using the wisdom of crowds to address the malware long tail
|
Symantec
|
Last-minute paper reserve: Fragmented distribution attack
|
Symantec
|
Last-minute presentation: The real face of Koobface
|
Trend Micro, Inc.
|
Challenges in kernel-mode memory scanning
|
McAfee
|
Misusing trust: search engines targeted to deliver malware
|
Symantec
|
Firefox malware, when your browser bites you
|
Candid Wueest
,
Elia Florio
,
Symantec
|
Last-minute presentation: iPhone v3 malware vector
|
McAfee
|
AntiRE en masse
|
|
Profiling hackers: real data, real experiences, wrong myths
|
|
The partnerka - what is it, and why should you care?
|
Sophos
|
Keynote address: Reforming the landscape
|
Google Inc.
|
Malware on a mission
|
|
Last-minute paper reserve: The Waledac botnet: understanding it and breaking it
|
Pierre-Marc Bureau
,
Joan Calvet
,
ESET
|
Last-minute presentation: Twarfing: malicious tweets
|
Kaspersky Lab
|
Social networks: 'Hit all once' - attackers' perspective
|
|
Whatever happened to the unlikely lads? A hoaxing metamorphosis
|
ESET
|
Modern day magic on the Internet
|
McAfee
|
Spam and legislation
|
Kaspersky Lab
|
Socialnetworkeering: do you know who your friends really are?
|
Andrew Lee
|
ANUBIS - ANalyzing Unknown BInarieS - the automatic way
|
Engin Kirda
|
'I can't go back to yesterday, because I was a different person then'
|
Microsoft Corporation
|
Panel discussion: Free AV vs paid-for AV, Rogue AVs
|
|
A spam novelty detection system
|
|
The CURSE of anti-spam testing
|
|
When web 2.0 sneezes, everyone gets sick
|
Kaspersky Lab
|
A fractal approach to social network spam detection
|
|
Last-minute presentation: Brazil: land of plentiful bankers
|
Kaspersky Lab
|
Win32/Sality network activity
|
|
A closer look at Mac OS X threats
|
|
Volume of threat: the AV update deployment bottleneck
|
Trend Micro, Inc.
|
Tales from cloud nine
|
|
Last-minute presentation: Connecting the AV industry
|
Igor Muttik
,
McAfee
|
How to reclaim your sender reputation
|
Microsoft Corporation
|
Virtual machines for real malware capture and analysis
|
IBM
|
JavaScript security: the elephant running in your browser
|
|
Malice through the looking glass: behaviour analysis for the next decade
|
ESET
|
Hitting the 'up to date' bulls eye
|
|
Cyber-insurance: a financial perspective to incident response
|
|
Gimme me all your money!
|
Kaspersky Lab
|
The cloud or the mist?
|
Microsoft Corporation
|
Fighting cybercrime: technical, juridical, and ethical challenges
|
Fortinet, Inc.
|
The modern rogue - malware with a face
|
Microsoft Corporation
|
Blast from the past: application of the MS08-067 exploit in real world malware
|
Microsoft Corporation
|
URLCheck: making the world a safer place
|
|
Is there a lawyer in the lab?
|
ESET
|
Why 'in-the-cloud' scanning is not a solution
|
|
Last-minute presentation: Human-based computation: how crowd-sourcing can solve some of the trickiest security problems
|
Symantec
|