Star 0

Talks

Title Humans
Hiding the network behind the network. Botnet proxy business model Bitdefender
Early launch Android malware: your phone is 0wned
Exposing Android white collar criminals
Ubiquitous Flash, ubiquitous exploits and ubiquitous mitigation Elia Florio , Microsoft Corporation
How they're getting the data out of your network IBM
Quantifying maliciousness in Alexa top-ranked domains
Discussion panel: Vulnerability sharing in the age of Heartbleed Chester Wisniewski , Nick Sullivan , Sophos , CloudFlare , University of Washington , Kaspersky Lab
Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital era Kaspersky Lab
Can we trust a trustee? An in-depth look into the digitally signed malware industry Bitdefender
The three levels of exploit testing
Caphaw - the advanced persistent pluginer Fortinet, Inc.
Ebury and CDorked. Full disclosure Evgeny Sidorov , Pierre-Marc Bureau , Yandex , ESET
Methods of malware persistence on Mac OS X Patrick Wardle , Synack
Last-minute paper: Adventures in open directories Arbor Networks
The world turned upside down: researcher ethics in the new surveillance climate (sponsor presentation) HP
Last-minute paper: Back in BlackEnergy: 2014 targeted attacks in the Ukraine and Poland Robert Lipovsky , Anton Cherepanov , ESET
Using image similarity algorithms on application icons to discover new malware families on multiple platforms
DMARC - how to use it to improve your email reputation Microsoft Corporation
Duping the machine - malware strategies, post sandbox detection Sophos
Swipe away, we're watching you Fortinet, Inc.
Attack surface analysis of Tizen devices McAfee
Bootkits: past, present & future Eugene Rodionov , ESET , Intel Corporation
The battle against anonymous browsing: the security challenges presented by Tor
Evolution of Android exploits from a static analysis tools perspective Sophos
OPSEC for security researchers Kaspersky Lab
Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam
Protecting financial institutions from banking malware's man-in-the-browser attacks Shape Security
Optimized mal-ops. Hack the ad network like a boss Rahul Kashyap , Bromium
Last-minute paper: Killing the rootkit - perfect physical memory process detection Shane Macaulay , IOActive, Inc.
Last-minute paper: Into the unknown: how to detect BIOS-level attackers Xeno Kovah , Corey Kallenberg , John Butterworth , Sam Cornwell , The MITRE Corporation
Brazilian malware trends: CPL in the spotlight (sponsor presentation) ESET
Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing Sophos
P0wned by a barcode: stealing money from offline users Fabio Assolini , Kaspersky Lab
It has a EULA, it must be legit Bitdefender
Linux-based Apache malware infections: biting the hand that serves us all Symantec
How many anti-malware products does it take to change a country? Microsoft Corporation
Last-minute paper: How I hacked my own house! Kaspersky Lab
Last-minute paper: Attack points in health apps & wearable devices - how safe is your quantified self? Symantec
Labelling spam through the analysis of protocol patterns Bitdefender
Apple without a shell - iOS under targeted attack Tao Wei , Min Zheng , Hui Xue , Dawn Song , FireEye, Inc.
Microsoft Anti-Virus - extortion, expedience, or the extinction of the AV industry: the jury has reached a verdict
Design to discover: security analytics with 3D visualization engine Thibault Reuille , Dhia Mahjoub , OpenDNS
Android packer: facing the challenges, building solutions Sophos
The evolution of webinjects Jean-Ian Boutin , ESET
Sweeping the IP space: the hunt for evil on the Internet Dhia Mahjoub , OpenDNS
Malware Investigator Jonathan Burns
SafeMachine: malware needs love, too (sponsor presentation)
Last-minute paper: .NET malware dynamic instrumentation for automated and manual analysis Geoff McDonald , Microsoft Corporation
Leaving our ZIP undone: how to abuse ZIP to deliver malware apps Gregory Panakkal
Notes on click fraud: American story
We know it before you do: predicting malicious domains Palo Alto Networks
DNSSEC - how far have we come? Nick Sullivan , CloudFlare
An in-depth analysis of abuse on Twitter Trend Micro, Inc.
Smart home appliance security & malware HP
Keynote address: Choose your own keynote adventure - bounties and standards and vuln disclosure, oh my! Katie Moussouris , HackerOne