VB2011 conference programme

ICAL

Wednesday 5 October

Corporate stream Technical stream
08:00 Registration
10:00 Tea and coffee
10:30 - 10:50 Opening address
10:50 - 11:30 Keynote address: The m00p investigation: law enforcement and the anti-virus industry working in partnership
Bob Burls, Police Central e-Crime Unit, Mikko Hyppönen, F-Secure
11:30 - 12:00 A look at the cybercrime ecosystem and the way it works

Dmitry Bestuzhev, Kaspersky Lab
  Predicting the future of stealth attacks

Aditya Kapoor, McAfee
Rachit Mathur, McAfee
12:00 - 12:30 Bonnie and Clyde: the crazy lives of the Brazilian bad guys

Fabio Assolini, Kaspersky Lab
  Same botnet, same guys, new code

Pierre-Marc Bureau, ESET
Lunch
14:00 - 14:30 A study of malicious attacks on Facebook

Maria Patricia M. Revilla, Commtouch
Robert Sandilands, Commtouch
  A survey of Chinese DDoS malware

Jeff Edwards, Arbor Networks
Jose Nazario, Arbor Networks
14:30 - 15:00 Daze of whine and neuroses (but testing is FINE)

David Harley, ESET
Larry Bridwell, AVG
  The dangers of per-user COM objects in Windows

Jon Larimer, IBM
15:00 - 15:30 A second life in a virtual environment: from simple socialization to revealing sensitive information

Sabina Raluca Datcu, BitDefender
  File-fraction reputation based on digest of high granularity

Ethan YX Chen, Trend Micro
Tea and coffee
15:50 - 16:20 Social threats: how fragile we are

George Lucian Petre, BitDefender
  Strategies for prioritization of malicious URL re-evaluation

Onur Komili, Sophos
Kyle Zeeuwen, Sophos/University of British Columbia
Matei Ripeanu, University of British Columbia
Konstantin Beznosov, University of British Columbia
16:20 - 16:50 Automating social engineering

Alexandru Catalin Cosoi, BitDefender
Daniel Dichiu, BitDefender
  Malware mining

Igor Muttik, McAfee
16:50 - 17:20 Thriving business model around free security (sponsor presentation)

Milos Korenko, Avast Software
  Security 2012: staying ahead of the game (sponsor presentation)

Robert Lipovsky, ESET
Juraj Malcho, ESET
19.30 VB2011 drinks reception

Thursday 6 October

Corporate stream Technical stream
Breakfast
09:00 - 09:30 Malicious tools and techniques in a politicized, militarized cyberspace

Eli Jellenc, VeriSign-iDefense
  An OpenBTS GSM replication jail for mobile malware

Axelle Apvrille, Fortinet
09:30 - 10:00 Traffic direction systems as a factor of targeted infection

Max Goncharov, Trend Micro
  Enhancing filtering proactivity with reverse IP and reverse Whois queries

Claudiu Musat, BitDefender
Alin Octavian Damian, BitDefender
10:00 - 10:30 Lessons learned while sinkholing botnets - not as easy as it looks!

Rainer Link, Trend Micro
David Sancho, Trend Micro
  LAST-MINUTE PAPER: Cracking Xpaj; code and payload

Andrea Lelli, Symantec
Tea and coffee
10:50 - 11:20 Following the tracks: understanding snowshoe spam

Brett Cove, Sophos
  LAST-MINUTE PAPER: Modern bootkit trends: bypassing kernel-mode signing policy

Eugene Rodionov, ESET
Aleksandr Matrosov, ESET
11:20 - 11:50 Cyber attacks: how are Mac OS X and iOS users playing the role?

Methusela Cebrian Ferrer, iThreats
  LAST-MINUTE PAPER: Cleaning up the net - a tale of 100 infected websites

Stefan Tanase, Kaspersky Lab
11:50 - 12:20 Android malware is on the rise

Timothy Armstrong, Kaspersky Lab
Denis Maslennikov, Kaspersky Lab
  LAST-MINUTE PAPER: MUTE - Malware URL Tracking and Exchange

Costin Raiu, Kaspersky Lab
Jong Purisima, GFI Software
Nick Bilogorskiy,
Tony Lee, Microsoft
Philipp Wolf, Avira
Lunch
14:00 - 14:30 Clustering disparate attacks: mapping the activities of the advanced persistent threat

Martin Lee, Symantec.cloud
Daren Lewis, Symantec.cloud
  LAST-MINUTE PAPER: I looked at the eyes of Diablo and found an army of girls

Vicente Diaz, Kaspersky Lab
14:30 - 15:00 X is not enough! Grab the PDF by the tail!

Jindrich Kubec, AVAST Software
Jiri Sejtko, AVAST Software
  LAST-MINUTE PAPER: IEEE Software Taggant System

Mark Kennedy, Symantec
Igor Muttik, McAfee
15:00 - 15:30 Web browsers: a history of rogues

Christopher Boyd, GFI Software
  LAST-MINUTE PAPER: How do I know thee? Let me count the ways...

Nick FitzGerald, AVG
Tea and coffee
15:50 - 16:20 1 + 1 != 2 in malware scanning

Taeil Goh, OPSWAT
  LAST-MINUTE PAPER: Operation ShadySHARE - towards better industry collaboration

Alex Eckelberry, GFI Software
Dmitry Gryaznov, McAfee
Graham Cluley, Sophos
Ryan Naraine, ZDNet
16:20 - 16:50 Understanding consumer attitudes on anti-virus software (sponsor presentation)

Scott Joslin, comScore
 

19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 7 October

Corporate stream Technical stream
Breakfast
09:30 - 10:00 Your reputation precedes you

Gunter Ollmann, Damballa
  Browser exploit packs - exploitation paradigm

Aditya Sood, Michigan State University
Richard J. Enbody, Michigan State University
10:00 - 10:30 Cell phone money laundering

Denis Maslennikov, Kaspersky Lab
  Analysing the packer layers of rogue anti-virus programs

Rachit Mathur, McAfee
Zheng Zhang, McAfee
Tea and coffee
10:50 - 11:20 How to teach people to be aware of cyber security

Terry Zink, Microsoft
  Firing the roast - Java is heating up again

Kurt Baumgartner, Kaspersky Lab
11:20 - 11:50 The unexamined life-missing metrics of malware

David Perry, Trend Micro
  Dissecting Flash with EASE (Experimental ActionScript Emulator)

Bing Liu, Fortinet
11:50 - 12:20 Fake but free and worth every cent

Robert Lipovsky, ESET
Daniel Novomesky, ESET
Juraj Malcho, ESET
  Fast fingerprinting of OLE2 files: heuristics for detection of exploited OLE2 files based on specification non-conformance

Stephen Edwards, Sophos
Paul Baccas, Sophos
Lunch
14:00 - 14:30 Top exploits of 2011

Holly Stewart, Microsoft
  Static shellcode analysis and classification

Aleksander Czarnowski, AVET Information and Network Security
14:30 - 15:00 2020 threats: too far away to discuss or too close to ignore?

Maksym Schipka, Kaspersky Lab
Andrey Nikishin, Kaspersky Lab
  Bindex 2.0

Tim Ebringer, Microsoft
Tea and coffee
15:20 - 16:10 Panel discussion: Tackling botnets - tracking, felling and offensive strategies
16:10 - 16:20 Conference closing session

Reserve papers

Mobile security top 10 issues to consider

Jason Steer, Veracode
GPGPU and threat analysis

Takashi Katsuki, Symantec
Automating AutoIt detection

Benson Sy, Trend Micro
Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

AusCert2014

Virus Bulletin
In this month's magazine:
  • VBSpam comparative review March 2014
  • VB100 comparative review on Ubuntu Server 12.04LTS
  • The shape of things to come
  • Threat intelligence sharing: tying one hand behind our backs
  • The curse of Necurs, part 1
  • More fast or more dirty?
  • Tofsee botnet
  • Back to VBA
  • Is the security industry up to the new challenges to come?
  • Greetz from academe: No place to Hyde
Virus Bulletin 04 2014
Subscribe now!

Virus Bulletin currently has 231,301 registered users.