Hiding the network behind the network. Botnet proxy business model
|
Bitdefender
|
Early launch Android malware: your phone is 0wned
|
|
Exposing Android white collar criminals
|
|
Ubiquitous Flash, ubiquitous exploits and ubiquitous mitigation
|
Elia Florio
,
Microsoft Corporation
|
How they're getting the data out of your network
|
IBM
|
Quantifying maliciousness in Alexa top-ranked domains
|
|
Discussion panel: Vulnerability sharing in the age of Heartbleed
|
Chester Wisniewski
,
Nick Sullivan
,
Sophos
,
CloudFlare
,
University of Washington
,
Kaspersky Lab
|
Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital era
|
Kaspersky Lab
|
Can we trust a trustee? An in-depth look into the digitally signed malware industry
|
Bitdefender
|
The three levels of exploit testing
|
|
Caphaw - the advanced persistent pluginer
|
Fortinet, Inc.
|
Ebury and CDorked. Full disclosure
|
Evgeny Sidorov
,
Pierre-Marc Bureau
,
Yandex
,
ESET
|
Methods of malware persistence on Mac OS X
|
Patrick Wardle
,
Synack
|
Last-minute paper: Adventures in open directories
|
Arbor Networks
|
The world turned upside down: researcher ethics in the new surveillance climate (sponsor presentation)
|
HP
|
Last-minute paper: Back in BlackEnergy: 2014 targeted attacks in the Ukraine and Poland
|
Robert Lipovsky
,
Anton Cherepanov
,
ESET
|
Using image similarity algorithms on application icons to discover new malware families on multiple platforms
|
|
DMARC - how to use it to improve your email reputation
|
Microsoft Corporation
|
Duping the machine - malware strategies, post sandbox detection
|
Sophos
|
Swipe away, we're watching you
|
Fortinet, Inc.
|
Attack surface analysis of Tizen devices
|
McAfee
|
Bootkits: past, present & future
|
Eugene Rodionov
,
ESET
,
Intel Corporation
|
The battle against anonymous browsing: the security challenges presented by Tor
|
|
Evolution of Android exploits from a static analysis tools perspective
|
Sophos
|
OPSEC for security researchers
|
Kaspersky Lab
|
Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam
|
|
Protecting financial institutions from banking malware's man-in-the-browser attacks
|
Shape Security
|
Optimized mal-ops. Hack the ad network like a boss
|
Rahul Kashyap
,
Bromium
|
Last-minute paper: Killing the rootkit - perfect physical memory process detection
|
Shane Macaulay
,
IOActive, Inc.
|
Last-minute paper: Into the unknown: how to detect BIOS-level attackers
|
Xeno Kovah
,
Corey Kallenberg
,
John Butterworth
,
Sam Cornwell
,
The MITRE Corporation
|
Brazilian malware trends: CPL in the spotlight (sponsor presentation)
|
ESET
|
Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing
|
Sophos
|
P0wned by a barcode: stealing money from offline users
|
Fabio Assolini
,
Kaspersky Lab
|
It has a EULA, it must be legit
|
Bitdefender
|
Linux-based Apache malware infections: biting the hand that serves us all
|
Symantec
|
How many anti-malware products does it take to change a country?
|
Microsoft Corporation
|
Last-minute paper: How I hacked my own house!
|
Kaspersky Lab
|
Last-minute paper: Attack points in health apps & wearable devices - how safe is your quantified self?
|
Symantec
|
Labelling spam through the analysis of protocol patterns
|
Bitdefender
|
Apple without a shell - iOS under targeted attack
|
Tao Wei
,
Min Zheng
,
Hui Xue
,
Dawn Song
,
FireEye, Inc.
|
Microsoft Anti-Virus - extortion, expedience, or the extinction of the AV industry: the jury has reached a verdict
|
|
Design to discover: security analytics with 3D visualization engine
|
Thibault Reuille
,
Dhia Mahjoub
,
OpenDNS
|
Android packer: facing the challenges, building solutions
|
Sophos
|
The evolution of webinjects
|
Jean-Ian Boutin
,
ESET
|
Sweeping the IP space: the hunt for evil on the Internet
|
Dhia Mahjoub
,
OpenDNS
|
Malware Investigator
|
Jonathan Burns
|
SafeMachine: malware needs love, too (sponsor presentation)
|
|
Last-minute paper: .NET malware dynamic instrumentation for automated and manual analysis
|
Geoff McDonald
,
Microsoft Corporation
|
Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
|
Gregory Panakkal
|
Notes on click fraud: American story
|
|
We know it before you do: predicting malicious domains
|
Palo Alto Networks
|
DNSSEC - how far have we come?
|
Nick Sullivan
,
CloudFlare
|
An in-depth analysis of abuse on Twitter
|
Trend Micro, Inc.
|
Smart home appliance security & malware
|
HP
|
Keynote address: Choose your own keynote adventure - bounties and standards and vuln disclosure, oh my!
|
Katie Moussouris
,
HackerOne
|