VB2008 conference programme


Wednesday 1 October

Corporate stream Technical stream
08:00 Registration
10:00 Tea and coffee
10:30 - 11:00 Opening address
11:00 - 11:40 Keynote address: The AV industry: Quo Vadis?
Alex Eckelberry, Sunbelt Software
11:40 - 12:20 The malware business

David Emm, Kaspersky Lab
  Towards integrated malware defence

Morton Swimmer, John Jay College of Criminal Justice/CUNY
14:00 - 14:40 Stormy Weather: a quantitative assessment of the Storm web threat in 2007

Raimund Genes, Anthony Arrott and David Sancho, Trend Micro
  Your computer is now stoned (...again!). The rise of MBR rootkits

Kimmo Kasslin, F-Secure
Elia Florio, Symantec
14:40 - 15:20 Intentions of capitalistic malware

Gunter Ollmann, Holly Stewart, IBM
  When the hammer falls - effects of successful widespread disinfection on malware development and direction

Matt McCormack, Microsoft
Tea and coffee
15:40 - 16:20 Affiliate web-based malware

Paul Baccas, Sophos
  Applying user-mode memory scanning on Windows NT

Eric Uday Kumar, Authentium
16:20 - 17:00 Life beyond outbreaks - marketing in today's threat environment

Jeff Aboud, In-Focus Marketing
  Packer visualisation: a fast entropy scanning algorithm that preserves local detail

Tim Ebringer, University of Melbourne
Li Sun, RMIT University
17:00 - 19:00 Sponsor presentations
(There are still a number of sponsorship opportunities available. Contact Allison Sketchley for more information.)
19.30 Welcome drinks reception

Thursday 2 October

Corporate stream Technical stream
09:00 - 09:40 How secure is your virtualized network?

Joshua Corman, IBM
  Graph, entropy and grid computing: automatic comparison of malware

Ismael Briones Vilar, PandaLabs
09:40 - 10:20 Network access control technologies

Benjamin Czarny, OPSWAT
  Taxonomy of web-based malware - finding rules for heuristic detection

Fraser Howard and Vanja Svajcer, Sophos
Tea and coffee
10:40 - 11:20 Here comes the flood/end of the pattern file

David Perry, Trend Micro
  The robustness of new email identification standards

Patrik Ostrihon, COMDOM Software
Reza Rajabiun, COMDOM Software and York University
11:20 - 12:00 VCC - Virus Control Center: a home-grown helpdesk application to efficiently handle the never-ending flood of malware

Oliver Auerbach, Cosmin Ancuta and Robert Harja, Avira
  Coordinated distributions method for tracking botnets sending out spam

Andrey Bakhmutov, Kaspersky Lab
12:00 - 12:40 Mapping and understanding extinction patterns for viruses and worms over 15 years

Joe Wells, Lavasoft
  Malware forensics: detecting the unknown

Martin Overton, IBM
14:00 - 14:40 Non-English spam: a case study

Vipul Sharma, Yanyan Yang and Jason Wallace, Proofpoint
  Last-minute presentations:

14:00 - 14:20 VB testing - present status, future plans, John Hawes, Virus Bulletin
14:20 - 14:40 Race to zero with online scanners, Boris Lau, Sophos
14:40 - 15:20 Russian spammers: the view from Russia

Darya Gudkova, Kaspersky Lab
  Last-minute presentations:

14:40 - 15:00 There is (some) honour among South American authors of infostealer trojans!, Pedro Bueno, McAfee
15:00 - 15:20 Apple iPhone programming with SDK, Marius van Oers, McAfee
Tea and coffee
15:40 - 16:20 The NorTel Mailer: effective open-source spam filtering for enterprises

Chris Lewis and Thomas Choi, Nortel
  Last-minute presentations:

15:40 - 16:00 P0wn the cloud. The good, the bad, and the pugly of cloud computing, Dan Hubbard, Websense
16:00 - 16:20 Recent rogueware, Kurt Baumgartner, PC Tools
16:20 - 17:00 SCADA security - who is really in control of our control systems?

Peter Allor, IBM
  Last-minute presentations:

16:20 - 16:40 URLCheck: malware and phishing URL aggregator, Sorin Mustaca, Avira
16:40 - 17:00 Last-minute malicious packer dissected, Nicolas Brulez, Websense
17:00 - 17:40 Panel discussion: The state of anti-malware testing
chaired by Stuart Taylor, Sophos
19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 3 October

Corporate stream Technical stream
09:40 - 10:20 Understanding and teaching bots and botnets

Randy Abrams, ESET
  Game-theoretic framework to assess attack-resistance of an AV system

Bin Mai, Northwestern State University
Anshuman Singh, Andrew Walenstein and Arun Lakhotia, University of Louisiana at Lafayette
Tea and coffee
10:40 - 11:20 Who will test the testers?

David Harley and Andrew Lee, ESET
  Automatic rules-based binary analysis with IDA Pro and CLIPS

Ryan Hicks, AVG
11:20 - 12:00 Playing with shadows - exposing the black market for online game password theft

Chun Feng, Microsoft
  Rebuilding testing for the future

Igor Muttik and James Vignoles, McAfee
12:00 - 12:40 Report card on a network based anti-worm defence system

John Morris, Nortel
  Samples.malware.org: sample sharing for the next decade?

Richard Ford, Thomas Walsh and William Allen, Florida Institute of Technology
14:00 - 14:40 Where do your users want to go today and can you stop them?

Bruce Hughes, AVG
  Clean data profiling

Catherine Robinson, Julie Weber, Bartlomiej Uscilowski and Thomas Parsons, Symantec
14:40 - 15:20 The name of the dose: does malware naming still matter?

Pierre-Marc Bureau and David Harley, ESET
  Malware development life cycle

Raymond Roberts, Microsoft
Tea and coffee
15:40 - 16:20 A look at defence in depth

Kenneth Bechtel, Team Anti-Virus
  Darwin inside the machines: malware evolution and the consequences for computer security

Peter Ször, Symantec
Dimitris Iliopoulos and C. Adami, Keck Graduate Institute of Applied Life Sciences
16:20 - 17:00 Security in banking forum
Nick FitzGerald, Reza Rajabiun, Eric Davis, chaired by Jan Hruska
17:00 - 17:15 Conference closing session

Reserve papers

Using throttling and traffic shaping to combat botnet spam

Ken Simpson, MailChannels

VB Conferences

VB2016 (Denver)

VB2015 (Prague)

VB2014 (Seattle)

VB2013 (Berlin)

VB2012 (Dallas)

VB2011 (Barcelona)

VB2010 (Vancouver)

VB2009 (Geneva)

VB2008 (Ottawa)

VB2007 (Vienna)

VB2006 (Montréal)

VB2005 (Dublin)

VB2004 (Chicago)

VB2003 (Toronto)

VB2002 (New Orleans)

VB2001 (Prague)

VB2000 (Orlando)

VB99 (Vancouver)

VB98 (Munich)

VB97 (San Francisco)

VB96 (Brighton)

VB95 (Boston)

VB94 (Jersey)

VB93 (Amsterdam)

VB92 (Edinburgh)

VB91 (Jersey)

‘I attend a variety of security conferences and events each year and VB continues to be my favourite. Great content, great networking, great organisation.’

Jobs Career Sidebar