In November 2013, the security community lost one of its brightest lights with the death of security researcher and VB advisory board member Péter Szőr.
As a way of celebrating Péter's life and work on an ongoing basis, and keeping his memory alive, VB set up an annual award, which is known as the "Péter Szőr Award".
The award aims to recognise the best piece of technical security research published each year. Nominations for the award are sought from the security community at large, and a final shortlist voted on by the VB advisory board. The award is presented each year at the annual VB conference.
Péter Szőr contributed almost 40 articles to Virus Bulletin over the years, spoke at several VB conferences, and served for more than ten years on the VB advisory board. Péter was also well known as the author of the popular The Art of Computer Virus Research and Defense — a book which, for many, served as their first introduction to and basic grounding in computer security. Most importantly, he was known by everyone who encountered him for his great kindness and generosity.
The winner of the 2024 Péter Szőr Award for the best technical security research is ESET researcher Marc-Etienne M.Léveillé for "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain" (published here).
The award was presented during VB2024 in Dublin. The other shortlisted nominees were:
"BlackLotus UEFI bootkit: Myth confirmed" by Martin Smolár at ESET (published here).
The award was presented at VB2023 in London. The other shortlisted finalist was:
CryptoRom Bitcoin swindlers target vulnerable iPhone and Android users by Jagadeesh Chandraiah & Xinran Wu at Sophos (published here, here and here)
The award was presented during 2022 in Prague. The other shortlisted nominees were:
DNS Hijacking Abuses Trust in Core Internet Service by Cisco Talos (published here)
The award was presented during VB2019 in London. The other shortlisted nominees were:
ShadowPad – poisoned server management software targeting corporate networks by the Global Research and Analysis Team (GReAT) at Kaspersky Lab (published here)
The award was presented during VB2018 in Montreal. The other shortlisted nominees were:
AKBuilder – the crowdsourced exploit kit by Sophos researcher Gabor Szappanos (published here).
The award was presented during VB2017 in Madrid. The other shortlisted nominees were:
Mofang: A politically motivated information stealing adversary by Fox-IT researcher Yonathan Klijnsma (published here).
The award was presented during VB2016 in Denver. The other nominees were:
Catch Me if You Can by Intel Security researchers Anand Bodke, Abhishek Karnik, Sanchit Karve and Raj Samani (research described here).
The award was presented during VB2015 in Prague. The other nominees were:
Operation Windigo by ESET researchers Olivier Bilodeau, Pierre-Marc Bureau, Joan Calvet, Alexis Dorais-Joncas, Marc-Etienne Léveillé and Benjamin Vanheuverzwijn (published here).
The award was presented during VB2014 in Seattle, WA, USA. The other nominees were:
2 - 4 October 2024