VB2007 conference programme

ICAL

Wednesday 19 September

Corporate stream Technical stream
08:00 Registration
10:00 Tea and coffee
10:30 - 11:00 Opening address
11:00 - 11:40 Browsing the deeps - a look into malware in the web

Sami Rautiainen, Stonesoft
  A road to big money: evolution of automation methods in malware development

Maksym Schipka, MessageLabs
11:40 - 12:20 Changing battleground: security against targeted, low-profile attacks

Abhilash Sonwane, Cyberoam
  Anti-malware expert system

Kyu-beom Hwang, Deok-young Jung, AhnLab
Lunch
14:00 - 14:40 Playing dirty: evolving security threats in the gaming world

Amir Fouda, Hannah Mariner, CA
  DSD Tracer - implementation and experimentation

Boris Lau, Sophos
14:40 - 15:20 Insecurity and malware in virtual universes

Morton Swimmer, Dirk Husemann, IBM
  Pimp my PE: taming malicious and malformed executables

Casey Sheehan, Sunbelt Software
Tea and coffee
15:40 - 16:20 Application control for malware protection

Vanja Svacjer, Sophos
  Anti-rootkit safeguards: welcome Vista

Aleksander Czarnowski, Avet
16:20 - 17:00 Hurricane approach: 'false Positive' whens, not ifs

Mario Vuksan, Bit9
  Patching. Is it always with the best intentions?

Alex Hinchliffe, McAfee
17:00 - 19:00 Sponsor presentations
19.30 Welcome drinks reception

Thursday 20 September

Corporate stream Technical stream
Breakfast
09:00 - 09:40 The journey so far: trends, graphs and statistics

Martin Overton, Independent researcher, UK
  eSWAT: a spyware-resistant virtual keyboard

William Allen, Richard Ford, Aldwin Saugere, Florida Institute of Technology
09:40 - 10:20 What a waste - the AV community DoS-ing itself

Joe Telafici, Dmitry Gryaznov, McAfee
  Stopping malware at the gateway: challenges and solutions

Martin Stecher, Secure Computing
Tea and coffee
10:40 - 11:20 The WildList is dead, long live the WildList!

Andreas Marx, Frank Dessmann, AV-Test.org
  Continual feature selection: a cost effective method for enhancing the capabilities of enterprise spam solutions

Vipul Sharma, John Gardiner Myers, Steve Lewis, Proofpoint
11:20 - 12:00 The marriage of spam and malware: Implications for SMTP malware defence

Peter Eicher, Commtouch Software
  Have you got anything without spam in it?

Tim Ebringer, CA
12:00 - 12:40 A testing methodology for rootkit removal effectiveness

Josh Harriman, Symantec
  Detecting spam pictures using statistical features

Sándor Antal, VirusBuster
Lunch
14:00 - 14:40 Transforming victims into cyber-border guards: education as a defence strategy

Jeannette Jarvis, Microsoft
  'Last-minute' presentations

14:00 - 14:20 Reza Rajabiun, COMDOM Software
14:20 - 14:40 Robert Freeman, IBM
14:40 - 15:20 Phish phodder: is user education helping or hindering?

Andrew Lee, Eset
David Harley, Small Blue-Green World
  'Last-minute' presentations

14:40 - 15:00 Dmitry Gryaznov, McAfee
15:00 - 15:20 Sergei Shevchenko, PC Tools
Tea and coffee
15:40 - 16:20 The Spammers' Compendium: five years on

John Graham-Cumming, Independent author
  'Last-minute' presentations

15:40 - 16:00 Andrew Walenstein, University of Louisiana at Lafayette
16:00 - 16:20 Erik Wu and Feike Hacquebord, Trend Micro
16:20 - 17:00 Pump-n-dump for fun & profit: an in-depth look into stock spam and brokerage account compromise operations

Dmitri Alperovitch, Dr Paul Judge, Dr Sven Krasser, Dr Phyllis Schneck, Secure Computing
Dane VandenBerg, US National Cyber-Forensics and Training Alliance
  'Last-minute' presentations

16:20 - 16:40 Roel Schouwenberg, Kaspersky Lab
16:40 - 17:00 Kurt Baumgartner, PC Tools
17:00 - 18:00 Sponsor presentations
19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 21 September

Corporate stream Technical stream
Breakfast
09:40 - 10:20 Menace 2 the wires: advances in the business models of cybercriminals

Guillaume Lovet, Fortinet
  Formal model proposal for (malware) program stealth

Eric Filiol, Virology and Cryptology Lab, Army Signals Academy
Tea and coffee
10:40 - 11:20 The trojan money spinner

Mika Ståhlberg, F-Secure
  Virusability of modern mobile environments

Vesselin Bontchev, FRISK
11:20 - 12:00 Once upon a time a trojan...

Luis Corrons, Panda
  Unpacking PE files on Windows Mobile

Nicolas Brulez, Websense
12:00 - 12:40 New approaches to categorising economically-motivated digital threats

Anthony Arrott, David Perry, Trend Micro
  Apple Media Files and iPhone

Marius van Oers, McAfee
Lunch
14:00 - 14:40 The strange case of Julie Amero

Alex Shipp, MessageLabs
  A deeper look at malware - the whole story

Bryan Lu, Fortinet
14:40 - 15:20 Application forensics

Tim Ebringer, CA
  Malware removal - beyond content and context scanning

Tom Brosch, Maik Morgenstern, AV-Test.org
Tea and coffee
15:40 - 16:20 Future threats

John Aycock, Department of Computer Science, University of Calgary
Alana Maurushat, Faculty of Law, University of New South Wales
  Virus linguistics - searching for ethnic words

Masaki Suenaga, Symantec
16:20 - 17:00 Panel discussion: The fight against international cyber crime - enforcing the law
David Thomas, FBI, Stacy Arruda, FBI, Kevin Zuccato, Australian Federal Police, Mark Oram, CPNI, TBC, TBC
17:00 - 17:15 Conference closing session

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

SMI Oil and Gas Cyber Security 2014

Virus Bulletin
In this month's magazine:
  • VBSpam comparative review March 2014
  • VB100 comparative review on Ubuntu Server 12.04LTS
  • The shape of things to come
  • Threat intelligence sharing: tying one hand behind our backs
  • The curse of Necurs, part 1
  • More fast or more dirty?
  • Tofsee botnet
  • Back to VBA
  • Is the security industry up to the new challenges to come?
  • Greetz from academe: No place to Hyde
Virus Bulletin 04 2014
Subscribe now!

Virus Bulletin currently has 231,303 registered users.