Call for last-minute papers for VB2015 announced

Posted by   Virus Bulletin on   Jul 21, 2015

Ten speaking slots waiting to be filled with presentations on 'hot' security topics.

There's never a dull moment in the world of IT security. Whether you think the breach of spyware maker Hacking Team is the most important story of the past few months, that the breach at Ashley Madison was at least as embarrassing for those affected, or you feel that the fact that anti-virus companies were found to be targeted by a piece of sophisticated malware as well as by intelligence agencies directly is a more important story: it's been an interesting few months.

With all of this in the news, we are all the more glad that, just as in previous years, we have set aside a portion of the VB2015 conference programme for 'last-minute papers': presentations dealing with up-to-the-minute specialist topics, with the emphasis on current and emerging ('hot') topics.

We have now opened the call for papers for these slots. The deadline for submissions is 3 September 2015, after which the selection committee will go through the submissions and make the final selection.

Those selected for the last-minute presentations will be notified by email 18 days prior to the start of the conference. One complimentary conference place will be allocated to each last-minute presentation selected. (Where a presentation is submitted by more than one speaker, one free conference place will be allocated, and co-speakers (who must be named at the time of abstract submission) will receive a 50% discount on the conference registration fee.)

Please submit your proposals using our online abstract submission form. And of course, don't hesitate to contact [email protected] if you have any questions.

And should you, while thinking about what to submit, feel inspired by a great piece of research performed by someone else, why not nominate it for the Péter Ször Award?



Posted on 21 July 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.