VB2005 conference programme

ICAL

Wednesday 5 October

Corporate stream Technical stream
08:00 Registration
09:00 - 12:50 Sponsor presentations
14:00 - 14:30 Opening address
14:30 - 15:10 Bots and botnets – risks, issues and prevention

Martin Overton, IBM Global Services
  Manipulating the Internet

Dr Igor Muttik, McAfee AVERT
15:10 - 15:50 Anonymous and Malicious

John Aycock, Department of Computer Science, University of Calgary
Andreas Hirt, Department of Computer Science, University of Calgary
  Desktop search: a new platform for malware scanning?

Andy Payne, WholeSecurity, Inc.
Oliver Schmelzle, WholeSecurity, Inc.
Tea and coffee
16:20 - 17:00 Effective security policy management

Michael D. Thacker, IBM Virus CERT
  Tracing execution paths

Maksym Schipka, MessageLabs
17:00 - 17:40 Malware in popular networks

Dmitry Gryaznov, McAfee AVERT
  Defeating polymorphism: beyond emulation

Adrian E. Stepan, Microsoft
19.00 Drinks reception

Thursday 6 October

Corporate stream Technical stream
Breakfast
09:00 - 09:40 A practical understanding of malware security

Greg Day, McAfee
  Solving the Bagle jigsaw

Scott Molenkamp, Computer Associates
Hamish O’Dea, Computer Associates
09:40 - 10:20 Teach your children well

David Harley, NHS Connecting for Health/independent researcher
Eddy Willems, NOXS and EICAR
Judith Harley, Bohunt Community School, UK
  The evolution of IRC bots

John Canavan, Symantec Security Response
Tea and coffee
10:40 - 11:20 The self-defending network a resilient network

Steen Pedersen, Ementor
  What makes Symbian malware tick

Jarno Niemelä, F-Secure
11:20 - 12:00 Implementing an enterprise anti-virus and anti-spam strategy, adventures in the real world

Earl Greer, PeoplesInformation.com
Vincil Bishop, PeoplesInformation.com
  Reverse engineering and Java viral analysis

Daniel Reynaud-Plantey, Army Signals Academy, Virology and Cryptology Laboratory, Rennes, France & Ecoles de Coëtquidan, Ecole Spéciale Militaire, Guer, France
12:00 - 12:40 Combined hardware/software solutions to malware and spam control

Steve Posniak, Office of Information Technology, US Equal Employment Opportunity Commission
  Executable encryption for Pocket PC and SmartPhone devices

Nicolas Brulez, Websense Security Labs
Lunch
14:00 - 14:40 2004 – 2005: commercial and non-commercial attempts to fight spam

Oren Drori, CommTouch
  Enhanced virus protection

Costin Raiu, Kaspersky Lab
14:40 - 15:20 Mapping the email universe

Paul Judge, CipherTrust
Dmitri Alperovitch, CipherTrust
  DEeP Protection or a Bit of a NiX? A closer look at Microsoft’s new memory protection offerings

Charles Renert, Determina
Tea and coffee
15:40 - 16:20 Best practices for evaluating anti-spam solutions

Nathan Turajski, Trend Micro
  Hide 'n seek revisited – full stealth is back

Kimmo Kasslin, F-Secure Corporation
16:20 - 17:00 Dying for information in the information age
Chair: Gaby Dowling, Sullivan & Cromwell
19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 7 October

Corporate stream Technical stream
Breakfast
09:40 - 10:20 Current status of the CARO malware naming scheme

Dr Vesselin Bontchev, FRISK Software International
  Genotype spam detection

Dmitry Samosseiko, SophosLabs
Tea and coffee
10:40 - 11:20 Defining rules for acceptable adware

Jason Bruce, SophosLabs
  Why ‘user authentication’ is a bad idea

Nick FitzGerald, Computer Virus Consulting
11:20 - 12:00 The twisted family tree of the Transponder Gang

Joe Telafici, McAfee AVERT
Seth Purdy, McAfee AVERT
  Pseudo-words for spam detection in an unmodified Naive Bayesian Text Classifier

John Graham-Cumming , POPFile Project
12:00 - 12:40 The strange case of Judith C.

David Perry, Trend Micro
  Legislation & technology: a coordinated approach toward achieving effective anti-spam law enforcement

Matthew Prince, Unspam LLC & John Marshall Law School
Lunch
14:00 - 14:40 Threats and risks to mobile phones in Japan

Kaoru Hayashi, Symantec Security Response
  Generic unpacking – how to handle modified or unknown PE compression engines?

Tobias Graf, Ewido Networks
14:40 - 15:20 Win32/Blaster: a case study from Microsoft’s perspective

Matthew Braverman, Microsoft
  Towards agile reverse engineering

Frederic Perriot, Symantec
Tea and coffee
15:40 - 16:20 VF-Atak (Virus Flood Attack on desktop anti-virus programs)

Lucijan Caric, Qubis
Tomo Sombolac, Qubis
  Techniques of adware and spyware

Eric Chien, Symantec
16:20 - 17:00 Insecurity in security software

Andreas Marx, AV-Test.org
Maik Morgenstern, AV-Test.org
Mary Landesman, About.com
  A behavioural analysis of information-stealing malware

Matthew Williamson, Sana Security Inc.
17:00 - 17:50 Who is hiding the virus writers?
Chair: David Perry, Trend Micro
17:50 - 18:00 Conference closing session

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 24 comments

AusCert2014

Virus Bulletin
In this month's magazine:
  • VBSpam comparative review March 2014
  • VB100 comparative review on Ubuntu Server 12.04LTS
  • The shape of things to come
  • Threat intelligence sharing: tying one hand behind our backs
  • The curse of Necurs, part 1
  • More fast or more dirty?
  • Tofsee botnet
  • Back to VBA
  • Is the security industry up to the new challenges to come?
  • Greetz from academe: No place to Hyde
Virus Bulletin 04 2014
Subscribe now!

Virus Bulletin currently has 231,312 registered users.