VB2006 Montréal

2005-12-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Virus Bulletin is seeking submissions from those wishing to present at VB2006, the Sixteenth Virus Bulletin International Conference, which will take place 11–13 October 2006 at the Fairmont The Queen Elizabeth, Montréal, Canada.


Introduction

Virus Bulletin is seeking submissions from those wishing to present at VB2006, the Sixteenth Virus Bulletin International Conference, which will take place 11–13 October 2006 at the Fairmont The Queen Elizabeth, Montréal, Canada.

The conference will include three days of 40-minute presentations running in two (2) concurrent streams: Technical and Corporate. Submissions are invited on all subjects relevant to anti-malware and anti-spam. In particular, VB welcomes the submission of papers that will provide delegates with ideas, advice and/or practical techniques, and encourages presentations that include practical demonstrations of techniques or new technologies.

Suggested topics

The following is a list of topics suggested by the attendees of VB2005. Please note that this list is not exhaustive, and papers on these and any other anti-malware and spam-related subjects will be considered.

Technical AV

  • Malware collection tools/honeypots

  • Malware classification tools

  • Spyware/adware – definition, techniques and detection

  • Spyware/adware – definition, techniques and detection

  • Spyware/adware – definition, techniques and detection

  • Malware with respect to cryptography

  • Malware with respect to cryptography

  • Threats and protection for mobile devices

  • Threats and protection for mobile devices

  • Emulation, engine level sandboxing, unpacking techniques

  • Rootkits

  • x64 malware

  • Malware on non-Windows platforms

  • Emulators/heuristics/PE unpacking on non-Windows platforms

  • Tools of the trade (deobfuscation, IR, etc.)

  • Tools of the trade (deobfuscation, IR, etc.)

  • Behavioural analysis and detection

  • Proof of concept demonstrations

  • Phishing

  • Latest malware outbreaks

  • Wireless security

  • CERT/vendor cooperation

  • Hardware supported virtualisation

Corporate AV

  • Case studies

  • Best practices

  • Policy enforcement

  • Vulnerability assessment

  • Vulnerability assessment

  • Phishing & fraud in the corporate environment

  • Phishing & fraud in the corporate environment

  • Online crime prevention

  • Tracing malware authors/perpetrators

  • Anti-virus & anti-spyware performance testing

  • Educating users

  • Management of anti-virus infrastructures

  • Proactive detection mechanisms

  • IDS/IPS

  • False positive prevention

  • Government security policies

  • IT outsourcing and associated risks

  • Mobile threats

  • Anti-malware managed services

Spam

  • Experience with spam filters in the corporate environment

  • Best practices

  • Spam and spammers from a legal point of view

  • Spam filter performance testing

  • Latest spam filter avoidance techniques (spammers’ tricks)

  • Latest anti-spam techniques

  • Filtering phishing mails

How to submit a paper

Abstracts of approximately 200 words must be sent as plain text files to no later than Thursday 9 March 2006. Submissions received after this date will not be considered. Please include full contact details with each submission.

Following the close of the call for papers all submissions will be anonymised before being reviewed by a selection committee; authors will be notified of the status of their paper by email. Authors are advised that, should their paper be selected for the conference programme, the deadline for submission of the completed papers will be Monday 5 June 2006 and that full papers should not exceed 6,000 words. Further details of the paper submission and selection process are available at http://www.virusbtn.com/conference/.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.