VB2013 speaker spotlight

Posted by   Virus Bulletin on   Sep 20, 2013

We speak to VB2013 presenter Rowland Yu about Android malware, his research interests, and what he aims to bring to VB2013.

The VB2013 conference takes place next month (2-4 October) in Berlin, with an exciting programme that covers many of today's most pertinent security-related topics.

Today, we speak to Rowland Yu, who will speak at VB2013 about GinMaster - one of the larges trojan families targeting the Android platform.

Tell us a little bit about yourself - your job and your responsibilities.

Rowland Yu "I have worked as a virus threat researcher in SophosLabs since 2006. My day-to-day responsibilities include dealing with various kinds of malware and spam threats, providing generic detection, and working on engine enhancements from a technical analyst's perspective. During the last year and a half, I have focused on Android research and I now lead a team responsible for Android malware analysis."

Can you give us a brief outline of what you will be speaking about at VB2013?

Rowland Yu "GinMaster is one of the longest and largest trojan families targeting the Android mobile system. In the paper, I will describe the malicious functionalities and techniques utilized in GinMaster malware and attempt to answer questions such as: 'What makes this Android malware family grow in volume and complexity?', 'Who is behind GinMaster?' and 'What business model drives their profits?'"

Why is your presentation particularly relevant to the security community?

Rowland Yu "Mobile devices play a significant role in today's society. The Android operating system is now dominating mobile platforms. Alongside the popularity of Android OS, attacks against Android are growing faster than expected. How serious are these attacks? What types of attacks are they? And what protection can security providers, IT organizations and individuals take to prevent these attacks? The presentation attempts to address these issues by illustrating one of the most complex and sophisticated pieces of Android malware - GinMaster."

What can delegates learn from your presentation?

Rowland Yu "The presentation demonstrates the significant evolution of three generations of malware by presenting GinMaster's trend chart, generation breakdown, and the technical teardown. The presentation also tries to disclose the malware's business model and profits for the purpose of illustrating the ecosystem of GinMaster. Furthermore, a typical sample like GinMaster can provide a comparison of the development of PC and Android malware, and help to understand the situation of Android malware in emerging countries especially in China, Thailand and Vietnam."

What other presentations are you looking forward to?

Rowland Yu "I'm particularly looking forward to the Android papers, such as Samir Mody's paper on Android malware obfuscation and the nexGIN RC team's paper on hunting for rogue smartphone malware applications."

Have you visited Berlin before? What are you looking forward to seeing/doing whilst in town?

Rowland Yu "I haven't been to Berlin before, but I am looking forward to visiting some of the world-famous landmarks such as the Brandenburg Gate, Fernsehturm Berlin, and Charlottenburg Palace."

Rowland Yu will present 'GinMaster: a case study in Android malware' at 09:00 on Thursday 3 October.

The full programme for VB2013, including abstracts for each paper, can be viewed here.

Read more about why you should attend VB2013 - and download our letter templates as a guide for justifying to your budget holder why you should attend VB2013.

VB2013 takes place 2-4 October 2013 in Berlin, Germany - online registration is now open - we'd love to see you there!

Posted on 20 September 2013 by Helen Martin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his…

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution…

VB2019 paper: Domestic Kitten: an Iranian surveillance program

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video…

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

VB2019 paper: DNS on fire

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.