VB2016 'Last-Minute' Papers Announced

Posted by   Martijn Grooten on   Sep 13, 2016

With a little over three weeks to go until VB2016, the conference programme is almost complete. We have a great selection of talks on the main programme, half a dozen Small Talks that we hope will lead to interesting discussions among participants, and a closing keynote from Morgan Marquis-Boire, the hacker, security researcher and journalist, known for his work for Citizen Lab and The Intercept.

We are excited to announce the addition of nine 'last-minute' papers to the programme: presentations covering very hot research topics, which were selected just last week.

Last year's closing keynote speaker, Kaspersky Lab researcher Costin Raiu, is back with a last-minute presentation on unattributed APT groups, which promises to be very exciting. The same holds for a presentation by his colleague Kurt Baumgartner, who will discuss watering hole attacks targeting Italian and Belgian users of encryption.

costinraiuvb2015.png

Not all attacks that affect businesses and individuals are targeted, and one of the most serious threats in the past few years has been ransomware. Though unbreakable when things are done right, fortunately mistakes are often made, allowing researchers to write decryption tools. Malwarebytes researcher hasherezade will talk about her efforts to break recent ransomware families.

If malware doesn't go after your files, then it often goes after your online banking details. Two last-minute presentations will look at banking malware, which remains a serious threat around the world. Jarosław Jedynak from CERT Poland will discuss Nymaim, malware that has targeted more than 270 Polish banks, while Avast's Jaromir Horejsi and Jan Sirmer will discuss how malicious proxy auto-config (PAC) files are used by the Retefe banking trojan.

It's not only Windows users that have to worry about threats these days: malware targeting OS X is increasingly common. ESET researchers Peter Kalnai and Martin Jirkal will discuss how both the KeRanger and the Keydnap malware were distributed as recompiled versions of the legitimate Transmission Bittorrent client. Synack's Patrick Wardle will present a new vector for malware on OS X to stealthily record audio and video, and will also look at the audio/video capture capabilities of the newly discovered Mokes trojan.

patrickwardlevb2015.png

With malware still as big a threat as it was a decade ago, there is understandably a lot of focus on endpoint security. However, the market of endpoint security products is rapidly changing. Adrian Sanabria from 451 Research will discuss these changes and predict how the market may look in five years' time.

Finally, not all attacks take place on the endpoint. The Border Gateway Protocol (BGP) is both an important glue that allows us to route packers over the Internet and a weak point that can (and sometimes is) abused. Mike Benjamin from Level 3 Communications will discuss the current state of BGP and what can be done to improve security.

Want to join us in Denver? Registration for VB2016 is still open and if you're a first time attendee (from a first-time company) you get a 30% discount!VB2016-dates-web.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

VB2019 paper: Why companies need to focus on a problem they do not know they have

Often unbeknownst to network administrators, many company networks are used to download child sexual abuse material. In a paper presented at VB2019 in London, NetClean’s Richard Matti and Anna Creutz looked at this problem and what companies can do,…

VB2020 update - currently business as usual

Here at VB we are keeping a close eye on the global situation regarding the COVID-19 outbreak and the various travel restrictions and health advice, but in the meantime planning and arrangements for VB2020 are going ahead as usual, including the…

VB2019 paper: Defeating APT10 compiler-level obfuscations

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro's paper and the recording of his presentation.

VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

At VB2019 in London Michael Raggi (Proofpoint) and Ghareeb Saad (Anomali) presented a paper on the 'Royal Road' exploit builder (or weaponizer) and how the properties of RTF files can be used to track weaponizers and their users. Today we publish…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.