VB2008 conference programme

ICAL

Wednesday 1 October

Corporate stream Technical stream
08:00 Registration
10:00 Tea and coffee
10:30 - 11:00 Opening address
11:00 - 11:40 Keynote address: The AV industry: Quo Vadis?
Alex Eckelberry, Sunbelt Software
11:40 - 12:20 The malware business

David Emm, Kaspersky Lab
  Towards integrated malware defence

Morton Swimmer, John Jay College of Criminal Justice/CUNY
Lunch
14:00 - 14:40 Stormy Weather: a quantitative assessment of the Storm web threat in 2007

Raimund Genes, Anthony Arrott and David Sancho, Trend Micro
  Your computer is now stoned (...again!). The rise of MBR rootkits

Kimmo Kasslin, F-Secure
Elia Florio, Symantec
14:40 - 15:20 Intentions of capitalistic malware

Gunter Ollmann, Holly Stewart, IBM
  When the hammer falls - effects of successful widespread disinfection on malware development and direction

Matt McCormack, Microsoft
Tea and coffee
15:40 - 16:20 Affiliate web-based malware

Paul Baccas, Sophos
  Applying user-mode memory scanning on Windows NT

Eric Uday Kumar, Authentium
16:20 - 17:00 Life beyond outbreaks - marketing in today's threat environment

Jeff Aboud, In-Focus Marketing
  Packer visualisation: a fast entropy scanning algorithm that preserves local detail

Tim Ebringer, University of Melbourne
Li Sun, RMIT University
17:00 - 19:00 Sponsor presentations
(There are still a number of sponsorship opportunities available. Contact Allison Sketchley for more information.)
19.30 Welcome drinks reception

Thursday 2 October

Corporate stream Technical stream
Breakfast
09:00 - 09:40 How secure is your virtualized network?

Joshua Corman, IBM
  Graph, entropy and grid computing: automatic comparison of malware

Ismael Briones Vilar, PandaLabs
09:40 - 10:20 Network access control technologies

Benjamin Czarny, OPSWAT
  Taxonomy of web-based malware - finding rules for heuristic detection

Fraser Howard and Vanja Svajcer, Sophos
Tea and coffee
10:40 - 11:20 Here comes the flood/end of the pattern file

David Perry, Trend Micro
  The robustness of new email identification standards

Patrik Ostrihon, COMDOM Software
Reza Rajabiun, COMDOM Software and York University
11:20 - 12:00 VCC - Virus Control Center: a home-grown helpdesk application to efficiently handle the never-ending flood of malware

Oliver Auerbach, Cosmin Ancuta and Robert Harja, Avira
  Coordinated distributions method for tracking botnets sending out spam

Andrey Bakhmutov, Kaspersky Lab
12:00 - 12:40 Mapping and understanding extinction patterns for viruses and worms over 15 years

Joe Wells, Lavasoft
  Malware forensics: detecting the unknown

Martin Overton, IBM
Lunch
14:00 - 14:40 Non-English spam: a case study

Vipul Sharma, Yanyan Yang and Jason Wallace, Proofpoint
  Last-minute presentations:

14:00 - 14:20 VB testing - present status, future plans, John Hawes, Virus Bulletin
14:20 - 14:40 Race to zero with online scanners, Boris Lau, Sophos
14:40 - 15:20 Russian spammers: the view from Russia

Darya Gudkova, Kaspersky Lab
  Last-minute presentations:

14:40 - 15:00 There is (some) honour among South American authors of infostealer trojans!, Pedro Bueno, McAfee
15:00 - 15:20 Apple iPhone programming with SDK, Marius van Oers, McAfee
Tea and coffee
15:40 - 16:20 The NorTel Mailer: effective open-source spam filtering for enterprises

Chris Lewis and Thomas Choi, Nortel
  Last-minute presentations:

15:40 - 16:00 P0wn the cloud. The good, the bad, and the pugly of cloud computing, Dan Hubbard, Websense
16:00 - 16:20 Recent rogueware, Kurt Baumgartner, PC Tools
16:20 - 17:00 SCADA security - who is really in control of our control systems?

Peter Allor, IBM
  Last-minute presentations:

16:20 - 16:40 URLCheck: malware and phishing URL aggregator, Sorin Mustaca, Avira
16:40 - 17:00 Last-minute malicious packer dissected, Nicolas Brulez, Websense
17:00 - 17:40 Panel discussion: The state of anti-malware testing
chaired by Stuart Taylor, Sophos
19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 3 October

Corporate stream Technical stream
Breakfast
09:40 - 10:20 Understanding and teaching bots and botnets

Randy Abrams, ESET
  Game-theoretic framework to assess attack-resistance of an AV system

Bin Mai, Northwestern State University
Anshuman Singh, Andrew Walenstein and Arun Lakhotia, University of Louisiana at Lafayette
Tea and coffee
10:40 - 11:20 Who will test the testers?

David Harley and Andrew Lee, ESET
  Automatic rules-based binary analysis with IDA Pro and CLIPS

Ryan Hicks, AVG
11:20 - 12:00 Playing with shadows - exposing the black market for online game password theft

Chun Feng, Microsoft
  Rebuilding testing for the future

Igor Muttik and James Vignoles, McAfee
12:00 - 12:40 Report card on a network based anti-worm defence system

John Morris, Nortel
  Samples.malware.org: sample sharing for the next decade?

Richard Ford, Thomas Walsh and William Allen, Florida Institute of Technology
Lunch
14:00 - 14:40 Where do your users want to go today and can you stop them?

Bruce Hughes, AVG
  Clean data profiling

Catherine Robinson, Julie Weber, Bartlomiej Uscilowski and Thomas Parsons, Symantec
14:40 - 15:20 The name of the dose: does malware naming still matter?

Pierre-Marc Bureau and David Harley, ESET
  Malware development life cycle

Raymond Roberts, Microsoft
Tea and coffee
15:40 - 16:20 A look at defence in depth

Kenneth Bechtel, Team Anti-Virus
  Darwin inside the machines: malware evolution and the consequences for computer security

Peter Ször, Symantec
Dimitris Iliopoulos and C. Adami, Keck Graduate Institute of Applied Life Sciences
16:20 - 17:00 Security in banking forum
Nick FitzGerald, Reza Rajabiun, Eric Davis, chaired by Jan Hruska
17:00 - 17:15 Conference closing session

Reserve papers

Using throttling and traffic shaping to combat botnet spam

Ken Simpson, MailChannels
Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

AusCert2014

Virus Bulletin
In this month's magazine:
  • VBSpam comparative review March 2014
  • VB100 comparative review on Ubuntu Server 12.04LTS
  • The shape of things to come
  • Threat intelligence sharing: tying one hand behind our backs
  • The curse of Necurs, part 1
  • More fast or more dirty?
  • Tofsee botnet
  • Back to VBA
  • Is the security industry up to the new challenges to come?
  • Greetz from academe: No place to Hyde
Virus Bulletin 04 2014
Subscribe now!

Virus Bulletin currently has 231,294 registered users.