Star 0

Talks

Title Humans
Virus patrol: five years of scanning the USENET
AVIEN - what a trip!
Software restriction policies in Windows XP Microsoft Corporation
TBC
Java 2 ME - a playground for malicious code?
What's the big idea? Trend Micro, Inc.
The Win32 worms: classification and possibility of heuristic detection
A year of WormCatching
Fighting network worms in a large corporate environment
Malware in a small pot Kaspersky Lab
What's next - prediciting the future by looking at the past
e-bugs: should anti-virus products detect them?
The administrator's guide to behaviour blocking
Are there any polymorphic macro viruses at all? (...and what to do with them)
How to use live viruses as an education tool
Heuristics: retrospective and future
The evolution of managing viruses in a large corporation IBM
Booting the unbootable
Macro and script virus polymorphism F-Secure
How to smell a RAT - remote administration tools vs backdoor Trojans
Remodelling the fortress: responding to new freedoms and new threats in 2002 and beyond
Sandbox II: Internet
Hidden under the hood - Linux backdoors F-Secure
Unix malware analysis after break-in
The four faces of a virus researcher
Corporate anti-virus best practices
32-bit virus threats on 64-bit Windows
Cleaning up the mess: time to redefine 'disinfection'? F-Secure
How squeaky are your wheels? - measuring the health of a user population
Computer viruses and the law Stanford University
Blended attacks: exploits, vulnerabilites and buffer overflow techniques in computer viruses
Retrospective testing - how good heuristics really work
Evolution of an automated virus scanning system Microsoft Corporation
Free anti-virus techniques