Malware

Title Speakers Conference Tags
What happened to targeted malware attacks last year? Boldizsár Bencsáth hacktivity-2013 - Budapest,Hungary Malware Survey
Reconstructing Gapz: Position-Independent Code Analysis Problem Aleksandr Matrosov , Eugene Rodionov REcon-2013 - Montreal,Canada Reverse Engineering Malware Defence
OVER-THE-AIR CROSS-PLATFORM INFECTION FOR BREAKING MTAN-BASED ONLINE BANKING AUTHENTICATION Alexandra Dmitrienko , Ahmad Sadeghi , Christopher Liebchen , Lucas Davi Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Malware Online Banking mTAN
QUANTIFYING MALICIOUSNESS IN ALEXA TOP-RANKED DOMAINS Paul Royal Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Malware Statistics Alexa
TARGETED MALWARE SOPHISTICATED CRIMINALS OR BABYTOWN FROLICS? Josh Grunzweig , Ryan Merritt Ruxcon-2012 - Melbourne, Australia Malware Defence
ANDROID MALWARE DETECTION IN THE CLOUD Hermes Li Ruxcon-2012 - Melbourne, Australia Android Malware Defence Tools WebSense
Supercompu4ng, Malware and Correla4on: What a Year in the Life of a MD5 Taught Us Wes Brown HITBSecConf Malaysia-2012 - KL, Malaysia Computer Forensics Reverse Engineering Malware
Behavior--based Methods for Automated, Scalable Malware Analysis Stefano Zanero HITBSecConf Malaysia-2012 - KL, Malaysia Reverse Engineering Malware Static Analysis At Scale Dynamic Analysis
Threat Attribution via DNS Gunter Ollmann Sector-2012 - Toronto,Canada DNS Malware Network Monitoring
A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES Rodrigo Rubira Branco BlackHat USA-2012 - Las Vegas, USA Malware Statistics Static Analysis Counter Measures Survey
ADVENTURES IN BOUNCERLAND Nicholas J. Percoco , Sean Schulte BlackHat USA-2012 - Las Vegas, USA Malware Bouncer Mobile Security Google Play Store
WE HAVE YOU BY THE GADGETS Toby Kohlenberg , Mickey Shkatov BlackHat USA-2012 - Las Vegas, USA Malware Windows Windows Gadgets
Flowers for automated malware analysis Paul Royal , Chengyu Song BlackHat USA-2012 - Las Vegas, USA Malware Counter Measures
Isn't it all just SMS-sending trojans?: Real advances in Android Malware Jimmy Shah ShakaCon-5 - Honolulu, USA Android Malware
Yara And Python: The Malware Detection Dynamic Duo Michael ( Mjg ) Goffin CarolinaCon-7 - Raleigh, USA Security Malware
Dissecting The Hack: Malware Analysis 101 Gerry Brunelle CarolinaCon-7 - Raleigh, USA Security Analysis Malware
Intersect: Combining Commercial/Foss Tools With Custom Code To Root Out Malware Matthew Pawloski , Fotios Lindiakos ShmooCon-2011 - Washington DC, USA Security Malware
Visual Malware Reversing: How To Stop Reading Assembly And Love The Code Danny Quist ShmooCon-2011 - Washington DC, USA Security Malware
Usb Autorun Attacks Against Linux Jon Larimer ShmooCon-2011 - Washington DC, USA Security Access Exploitation Malware
Adventures In Analyzing Stuxnet Bruce Dang , Peter Ferrie Chaos Communication Congress-27 - Berlin, Germany Analysis Malware
Clickjacking: An Empirical Study With An Automated Testing/Detection System Marco Balduzzi OWASP BeNelux-2010 - Netherlands Malware
Malware Migrating To Gaming Consoles : Embedded Devices, An Antivirus-Free Safe Hideout For Malware Ki-chan Ahn , Dong-joo Ha PacSec-2010 - Tokyo, Japan Security Hardware General Malware
Shai-Hulud - The Quest For Worm Sign Ken Lamkin Security B-Sides DFW-2010 - USA Security Analysis Malware
Malware Analysis Armin Garcia BugCon-2010 - Mexico Malware
Smartphones, Applications & Security Paul Sebastian Ziegler HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Access Malware
Resilient Botnet Command And Control With Tor Dennis Brown HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Monitoring Analysis Malware Botnets
Lessons Learned From Mariposa: Avoiding Disaster – Protecting From Cybercrime Luis Corrons HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Malware
Coseinc Automated Malware Analysis Lab (Camal) Udi Shamir SyScan-2010 - Taipei, Taiwan Security Analysis Malware
Hacking Printers For Fun And Profit Andrei Costin SyScan-2010 - Taipei, Taiwan Security Exploitation Malware
Packer Genetics: The Selfish Code Tora SyScan-2010 - Taipei, Taiwan Security Malware
Automatic Generation Of Remediation Procedures For Malware Infections Roberto Paleari , Lorenzo Martignoni , Emanuele Passerini , Drew Davidson , Matt Fredrikson , Jon Giffin , Somesh Jha 19th USENIX Security Symposium-2010 - Washington DC, USA Security Malware
Coseinc Automated Malware Analysis Lab (Camal) Udi Shamir NinjaCon-2010 - Vienna, Austria Security Malware Automation
Detecting Malicious Documentations Nguyen ANH Quynh NinjaCon-2010 - Vienna, Austria Others Malware
Malware Freak Show 2: The Client-Side Boogaloo Jibran - DEF CON-18 - Las Vegas, USA Security Malware
Malware Migrating To Gaming Consoles: Embedded Devices, An Antivirus-Free Safe Hideout For Malware Ki-chan Ahn , Dong-joo Ha DEF CON-18 - Las Vegas, USA Security Malware
0Box Analyzer: Afterdark Runtime Forensics For Automated Malware Analysis And Clustering Jeremy Chiu DEF CON-18 - Las Vegas, USA Security Analysis Malware Forensics
Coseinc Automated Malware Analysis Lab (Camal) Udi Shamir SyScan-2010 - Singapore Security Analysis Malware
Look Inside Mac Os X – Is It As Secure As We Expected? Xu Hao SyScan-2010 - HangZhou, China Security Malware
Advanced Malware Analysis Lab Wes Brown HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Analysis Malware
Malware Attribution: Tracking Cyber Spies And Digital Criminals Greg Hoglund Blackhat USA-2010 - Las Vegas, USA Security Malware
Malware Freak Show 2010: The Client-Side Boogaloo Nicholas J. Percoco , Jibran Ilyas Blackhat USA-2010 - Las Vegas, USA Security Malware
Neptune: Dissecting Web-Based Malware Via Browser And Os Instrumentation Rami Kawach Blackhat USA-2010 - Las Vegas, USA Security Malware Browser
Mod_Antimalware: A Novel Apache Module For Containing Web-Based Malware Infections Neil Daswani Blackhat USA-2010 - Las Vegas, USA Security Malware
Goodware Drugs For Malware: On-The-Fly Malware Analysis And Containment Damiano Bolzoni , Christiaan Schade Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Virt-Ice: Next Generation Debugger For Malware Analysis Quynh Nguyen Anh , Kuniyasu Suzaki Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
Dirtbox, A Highly Scalable X86/Windows Emulator Georg Wicherski Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware
You Will Be Billed $90,000 For This Call Mikko Hypponen Blackhat USA-2010 - Las Vegas, USA Security Malware
Drivesploit: Circumventing Both Automated And Manual Drive-By-Download Detection Wayne Huang , Caleb Sima Blackhat USA-2010 - Las Vegas, USA Security Analysis Malware Browser
Security Is Not A Four Letter Word Michael L. Davis Blackhat USA-2010 - Las Vegas, USA Security Malware Business
Exploiting Botnets For Profit And Fun Greg Martin Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Exploitation Malware
New Insights Into Clickjacking Marco Balduzzi OWASP Appsec-2010 - Stocholm, Sweden Security Malware Browser
Detecting And Protecting Your Users From 100% Of All Malware - How? Vadim Pogulievsky , Bradley Anstis OWASP Appsec-2010 - Stocholm, Sweden Security Intrusion Detection Incident Response Malware
Browser Extension Malware Tim Skorick Security B-Sides Denver-2010 - Denver, USA Malware Security
From Infection To Cashout - How The New Breed Of Trojans Operate Etay Maor ITWeb Security Summit-2010 - Johannesburg, South Africa Malware
Webcop: Locating Neighborhoods Of Malware On The Web Jack W. Stokes , Reid Andersen , Christian Seifert , Kumar Chellapilla 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security Web Malware
Teach To The Test: How Anti Malware Testing Gets It Wrong (And Makes Us Less Secure) Paul Roberts Security B-Sides Boston-2010 - Boston, USA Web Malware
Virus Writing Techniques Tim Sally THOTCON-1 - Chicago, USA Security Malware
Rooting Out The Bad Actors Alex Lanstein SOURCE Boston-2010 - Boston, USA Security Malware Botnets
Failagain'S Island - The Perils Of Banking In An Island Nation Andrew Hay SOURCE Boston-2010 - Boston, USA Security Monitoring Malware
State Of Malware: Family Ties Peter Carrera Blackhat Europe-2010 - Barcelona, Spain Security Rootkits Malware Development
Fast Automated Unpacking And Classification Of Malware Silvio Cesare Ruxcon-2010 - Melbourne, Austrailia Security Malware
Defending The Poor Felix ( FX ) Lindner Chaos Communication Congress-26 - Berlin, Germany Security Malware
Secubt Mathias Payer Chaos Communication Congress-26 - Berlin, Germany Security Malware
“Yes We Can’T!” - On Kleptography And Cryptovirology Moti Yung Chaos Communication Congress-26 - Berlin, Germany Security Cryptography Malware
Secure Software Updates: Update Like Conficker Jeremy Allen OWASP Appsec-2009 - Washington DC, USA Security Malware
How Low Will Malware Go? Nishad Herath HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Malware
Ekimono: A Malware Scanner For Virtual Machines Nguyen Anh Quynh HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Malware
The Bad Guys Are Winning: So Now What? Ed Skoudis HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Privacy Malware Phishing
State Of Malware: Explosion Of The Axis Of Evil Peter Silberman SOURCE Barcelona-2009 - Barcelona, Spain Security Others Malware
Botnets, Ransomware, Malware, And Stuff! Julia Wolf BruCON-2009 - Brussels, Belgium Malware Botnets
Malware Detection And Protection Niels Provos 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
Effective And Efficient Malware Detection At The End Host Christopher Kruegel , Xiaofeng Wang , Clemens Kolbitsch , Paolo Milani Comparetti , Engin Kirda , Sophia Zhou 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
Malware For Soho Routers Naxxatoe NinjaCon-2009 - Vienna, Austria Security Malware
Making Fun Of Your Malware Michael Ligh , Matt Richard DEF CON-17 - Las Vegas, USA Security Malware
Malware Freak Show Jibran Ilyas DEF CON-17 - Las Vegas, USA Security Malware
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis And Visualization Lorie M. Liebrock DEF CON-17 - Las Vegas, USA Security Analysis Malware
Automated Malware Similarity Analysis Daniel Raygoza DEF CON-17 - Las Vegas, USA Security Analysis Malware
Automated Malware Similarity Analysis Daniel Raygoza Blackhat USA-2009 - Las Vegas, USA Security Analysis Malware
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis And Visualization Lorie M. Liebrock , Danny Quist Blackhat USA-2009 - Las Vegas, USA Security Analysis Malware
Agentless Guest Protection - Stealthy Code Injection From The Virtual Machine Matthew ( Shok ) Conover SyScan-2009 - Singapore Security Malware
Outspect: Live Memory Forensic And Incident Response For Virtual Machine Nguyen Anh Quynh SyScan-2009 - Singapore Security Rootkits Exploitation Malware
Buffered Code Execution Version 3 - Analyzing Unknown Loaded Driver In Your Machine Matthew ( Shok ) Conover SyScan-2009 - Shanghai, China Security Malware
Malware Analysis Christopher Kruegel 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
Pehash: A Novel Approach To Fast Malware Clustering Georg Wicherski 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Malware Characterization Through Alert Pattern Discovery Steven Valdes 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Malware Analysis Methodology Thorsten Holz 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
Malware Behavior Jose Nazario 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
A View On Current Malware Behaviors Christopher Kruegel , Engin Kirda , Ulrich Bayer , Imam Habibi , Davide Balzarotti 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Detecting The Matrix: Hiding Virtual Machines From Malware Redspot CarolinaCon-5 - Raleigh, USA Security Malware
Anti-Debugging - A Developers Perspective Txs CarolinaCon-5 - Raleigh, USA Security Access Analysis Malware Development
Binary Clone Wars: Software Whitelisting For Malware Prevention And Coordinated Incident Response Shane ( K2 ) Macaulay , Derek Callaway SOURCE Boston-2009 - Boston, USA Security Malware
The Economics Of Cybercrime And The Law Of Malware Probability Sam Curry , Amrit Williams SOURCE Boston-2009 - Boston, USA Security Malware
Anti-Debugging - A Developer'S Viewpoint Tyler ( Txs ) Shields SOURCE Boston-2009 - Boston, USA Security Access Analysis Malware Development
Swf And The Malware Tragedy Bef Chaos Communication Congress-25 - Berlin, Germany Security Malware
Banking Malware 101 Thorsten Holz Chaos Communication Congress-25 - Berlin, Germany Security Malware
Detecting And Removing Malware Without Anti Virus Software - Hitb Lab Session Ching Tim Meng HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Malware
Bluepilling The Xen Hypervisor Alexander Tereshkin HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Firewall Exploitation Malware
Remote Code Execution Through Intel Cpu Bugs Kris Kaspersky HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Others Malware
Malware Rce: Debuggers And Decryptor Development Michael Ligh , Greg Sinclair DEF CON-16 - Las Vegas, USA Security Malware Development
Malware Detection Through Network Flow Analysis Bruce Potter DEF CON-16 - Las Vegas, USA Security Analysis Malware
Alternative Medicine: The Malware Analyst'S Blue Pill Paul Royal Blackhat USA-2008 - Las Vegas, USA Security Malware
Malware Detection Through Network Flow Analysis Bruce Potter Blackhat USA-2008 - Las Vegas, USA Security Analysis Malware
Jinx - Malware 2.0 Jonathan Rom , Itzik Kotler Blackhat USA-2008 - Las Vegas, USA Security Malware
Metamorphic / Polymorphic Malware Dna Chet Hosmer Blackhat USA-2008 - Las Vegas, USA Security Malware
Insane Detection Of Insane Rootkits: Chipset Based Approach To Detect Virtualization Malware Yuriy Bulygin Blackhat USA-2008 - Las Vegas, USA Security Malware
The Ghost In The Browser And Other Frightening Stories About Web Malware Niels Provos 17th USENIX Security Symposium-2008 - San Jose, USA Security Web Malware Browser
Embedded Script Attacks 嵌入式 script 攻擊(中) SyScan-2008 - Taipei, Taiwan Security Web Malware
Generic Electric Grid Malware Design - Attacking Scada System Eyal Udassin SyScan-2008 - Singapore Security Malware
Trusted Virtualization: The Next Big Thing? Gaith Taha SyScan-2008 - Singapore Security Malware
Blogging For Bad Guys: What Not To Say On-Line Thomas J. Holt CarolinaCon-4 - Raleigh, USA Security Malware
Malware On The Net - Behind The Scenes Iftach Ian Amit Blackhat Europe-2008 - Amsterdam, The Netherlands Security Malware
Automated Structural Malware Classification Ero ( Ertia ) Carrera SOURCE Boston-2008 - Boston, USA Security Malware
Not Dead But Twitching: Anti-Virus Succumbs To The Scourge Of Modern Malware Andrew Jaquith SOURCE Boston-2008 - Boston, USA Security Malware
Understanding Emerging Threats: The Case Of Nugache Bruce Dang , Dave Dittrich SOURCE Boston-2008 - Boston, USA Security Malware Botnets
Malware Software Armoring Circumvention Danny Valsmith ShmooCon-2008 - Washington DC, USA Security Malware
Bothunter: Detecting Malware Infection Through Ids-Driven Dialog Correlation Wenke Lee , Phillip Porras , Guofei Gu , Vinod Yegneswaran , Martin Fong 16th USENIX Security Symposium-2007 - Boston, USA Security Malware
Mobile Malware Mikko Hypponen 16th USENIX Security Symposium-2007 - Boston, USA Security Malware
Fighting Malware On Your Own Vitaliy Kamlyuk DEF CON-15 - Las Vegas, USA Security Malware
The Market For Malware Thomas J. Holt DEF CON-15 - Las Vegas, USA Security Malware
The Commercial Malware Industry Peter Gutmann DEF CON-15 - Las Vegas, USA Security Malware
Multiplatform Malware Within The .Net-Framework Paul Sebastian Ziegler , Tatsumori DEF CON-15 - Las Vegas, USA Security Malware
Malware Secrets Valsmith , Delchi DEF CON-15 - Las Vegas, USA Security Malware
Observing The Tidal Waves Of Malware Stefano Zanero Blackhat USA-2007 - Las Vegas, USA Security Malware
Status Of Cell Phone Malware In 2007 Mikko Hypponen Blackhat USA-2007 - Las Vegas, USA Security Malware
Stealth Secrets Of The Malware Ninjas Nick Harbour Blackhat USA-2007 - Las Vegas, USA Security Malware
Reversing C++ Paul Vincent Sabanal Blackhat USA-2007 - Las Vegas, USA Security Analysis Malware
Pyemu: A Multi-Purpose Scriptable X86 Emulator Cody Pierce Blackhat USA-2007 - Las Vegas, USA Security Analysis Malware Development
It'S All About The Timing Marco Slaviero Blackhat USA-2007 - Las Vegas, USA Security Web Firewall Malware
Hacking Intranet Websites From The Outside (Take 2)–Fun With And Without Javascript Malware Robert Hansen Blackhat USA-2007 - Las Vegas, USA Security Malware
Examining The On-Line Black Market Professor Tom Holt CarolinaCon-3 - Raleigh, USA Security Web Access Malware
My Company'S Trade Secrets Went To China And All I Got Was This Lousy Pink Slip - Defending Against Data-Exfiltrating Malware Joe Stewart ShmooCon-2007 - Washington DC, USA Security Malware
Javascript Malware For A Grey Goo Tomorrow Billy Hoffman ShmooCon-2007 - Washington DC, USA Security Malware
Stealth Malware - Can Good Guys Win? Joanna Rutkowska Chaos Communication Congress-23 - Berlin, Germany Security Malware
Automated Botnet Detection And Mitigation Georg 'oxff' Wicherski Chaos Communication Congress-23 - Berlin, Germany Security Analysis Malware
Client Honeypots - It’S Not Only The Network Michael L. Davis HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Web Monitoring Community Analysis Malware
Subverting Vista Kernel For Fun And Profit Joanna Rutkowska HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Malware Development Testing
Malware Repository Requirements Paul Vixie , David Dagon DEF CON-14 - Las Vegas, USA Security Malware
Tracksploits Lance James , Josh ( savant ) Brashars HOPE Number 6-2006 - USA Security Malware Forensics
Reverse Engineering Microsoft Binaries Alexander Sotirov SyScan-2006 - Singapore Security Malware
Subverting Vista Kernel For Fun And Profit Joanna Rutkowska SyScan-2006 - Singapore Security Malware
Malware Cinema: A Picture Is Worth A Thousand Packets Gregory Conti Blackhat Europe-2006 - Amsterdam, The Netherlands Security Malware
Combatting Symbian Malware Jarno Niemelä Blackhat Europe-2006 - Amsterdam, The Netherlands Security Malware
Rootkits Vs. Stealth By Design Malware Joanna Rutkowska Blackhat Europe-2006 - Amsterdam, The Netherlands Security Malware
Behavioral Malware Analysis Using Sandnets (Build It!) Joe Stewart ShmooCon-2006 - Washington DC, USA Security Analysis Malware
Profiling Rootkits And Malware Through Executive Objects Matthew ( Shok ) Conover SyScan-2005 - Singapore Security Rootkits Malware
Automated Malware Classification/Analysis Through Network Theory And Statistics Daniel Bilar Blackhat USA-2005 - Las Vegas, USA Security Malware Statistics
Hacking Intranet Websites From The Outside Javascript Malware Just Got A Lot More Dangerous Jeremiah Grossman , T.c. Niedzialkowski Blackhat USA-2005 - Las Vegas, USA Security Malware
Runtime Packers: The Hidden Problem? Maik Morgenstern , Tom Brosch Blackhat USA-2005 - Las Vegas, USA Security Malware
Hide 'N' Seek? - Anatomy Of Stealth Malware Gergely Erdelyi Blackhat Europe-2004 - Amsterdam, The Netherlands Security Malware
Internet Security: An Optimist Gropes For Hope William R. Cheswick 12th USENIX Security Symposium-2003 - Washington DC, USA Security Malware Business
Spass Mit Codeflow Analyse - Neuer Schwung Für Malware Thomas ( Halvar Flake ) Dullien , Scut , Stealth Chaos Communication Congress-19 - Berlin, Germany Security Malware
Decoding And Understanding Internet Worms Dale Coddington , Ryan Permeh Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Reverse Engineering Analysis Malware
An Open Source, International, Attenuated Computer Virus Dr. Cyrus Peikari DEF CON-09 - Las Vegas, USA Security Malware