Star 0

Talks

Title Humans
Economic sanctions on malware Intel Security
ROSCO: Repository Of Signed COde
Malware classification meets crowd sourcing (sponsor presentation)
WaveAtlas: surfing through the landscape of current malware packers Joan Calvet
Last-minute paper: Duqu 2.0 Win32k exploit analysis Jeong Wook Oh , Elia Florio , Microsoft Corporation
Last-minute paper: Operation Potao Express: analysis of a cyber-espionage toolkit Robert Lipovsky , Anton Cherepanov
Last-minute paper: The mysterious case of Linux.Wifatch
Digital 'Bian Lian' (face changing): the skeleton key malware Michael Cherny , Tal Be'ery , Microsoft Corporation
Last-minute paper: From Asia with love? Smartphones with pre-installed malware
Building a malware lab in the age of Big Data
Cross-platform mobile malware: write once run everywhere
The Volatility Bot-Excavator
POS fraud - trends and counter-actions to mass fraud
Last-minute paper: Anonymizing VPN services as a botnet monetization strategy — analysing the Bunitu botnet
The TAO of .NET and PowerShell malware analysis
It's a file infector... it's ransomware... it's Virlock
I am the Cavalry
Does prevalence matter? Ranking anti-malware products by potential victim impact Holly Stewart , Microsoft Corporation
Ubiquity, security and you - malware, security and the Internet of Things Microsoft Corporation
Operation Safety-Net: global best practices provide a secure path forward
How malware eats cookies - an empirical study of cookies in malware's communication Zhaoyan Xu , Palo Alto Networks
Last-minute paper: We know what you did this summer: Android banking trojan exposing its sins in the cloud Stephan Huber , Siegfried Rasthofer , Fraunhofer SIT , Intel Security
Sizing cybercrime: incidents and accidents, hints and allegations
Speaking Dyreza protocol. Advantages of 'learning' a new language
Effectively testing APT defences
Stego-malware in Google Play. Findings and limitations
SSL man-in-the-middle secure solution Intel Security
Last-minute paper: TurlaSat: The Fault in our Stars
The elephant in the room Marion Marschalek
The Clean Software Alliance, security, and the future of unwanted behaviours Microsoft Corporation
Windows 10 and the anti-malware ecosystem Microsoft Corporation
Dead and buried in their crypts: defeating modern ransomware Gregory Panakkal
Breaking the bank(er): automated configuration data extraction for banking malware
Last-minute paper: Making a dent in Russian mobile banking phishing
The Kobayashi Maru dilemma Andrew Lee , Trend Micro, Inc.
Anonymity is king Trend Micro, Inc.
Will Android trojan, worm or rootkit survive in SEAndroid and containerization?
Android ransomware: turning CryptoLocker into CryptoUnlocker (live demo)
Modelling the network behaviour of malware to block malicious patterns. The Stratosphere Project: a behavioural IPS Sebastian Garcia
Last-minute paper: Linux/Moose endangered or extinct? An update on this atypical embedded Linux botnet Olivier Bilodeau
The ethics and perils of APT research: an unexpected transition into intelligence brokerage
Attack on the drones: security vulnerabilities of unmanned aerial vehicles
C&C-as-a-Service: abusing third-party web services as C&C channels F-Secure
Doing more with less: a study of file-less infection attacks Trend Micro, Inc.
Botnet milking: malware freshly served from the source
Personnel shortage and diversity in IT: Is it truly a problem?
Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet Erik Wu
Solving the (in)security of home networked devices
Helping the helpless: targeted threats to civil society Claudio Guarnieri
Mobile banking fraud via SMS in North America: who's doing it and how
The evolution of ransomware: from CryptoLocker to CryptoWall
Last-minute paper: Exposing Gatekeeper Patrick Wardle
Catching the silent whisper: understanding the Derusbi family tree
A quantitative examination of the current state of corporate security practices Clint Gibler
Labeless - no more
Dare 'DEVIL': beyond your senses with Dex Visualizer
A timeless watch — ransomware on IoT devices Candid Wueest
Lightning talks
DDoS trojan: a malicious concept that conquered the ELF format
The Unbearable Lightness of APTing Yaniv Balmas , Shahar Tal , Check Point Software Technologies