AVAR 2014 Nov. 12, 2014 to Nov. 14, 2014, Sydney,Austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Anti-Ransomware ACL based VSS snapshot to secure Data Rahul Naik , Aishwary Bhashkar , Vikas Kumar Tiwari Ransomwares, infectors are targeting data stored on hard disk. They encrypt the data or change ...
Attacking TDS and web-shells management panels. Cases of study Evgeny Kovalev There are a lot of people among cybercryminals which hack web sites and upload web-shells. ...
Automated VirusLab using filters for semiautomatic file clustering and generating detections Alena Varkockova , Michal Augustyn At present, most AV companies are struggling with how to manage hundreds of thousands of ...
Defend Against Auto Attacks by Designing CAN Bus Firewall for Connected Smart Cars Wei Yan “I can see you've got your motor running. But don't you feel I am just ...
Dragonfly threat actor: TTP Marcin Siedlarz The talk summarizes Symantec's Attack Investigation Team research into Dragonfly threat actor. The main focus ...
Effectively Testing APT Defences Richard Ford , Gabor Szappanos , Simon Edwards Anyone watching the cybersecurity marketplace will have noticed a rapid rise in products that claim ...
Evolution of the android malware which targeted mobile financial services Sijoon Park , Seungwon Lee Mobile financial services such as online banking via smartphone are becoming more mainstream in many ...
Exploitation of CVE-2014-1761 in targeted attack campaigns Sébastien Duquette The use of zero-day exploits is strongly characteristic of APT campaigns; we saw this scenario ...
Hardware Security Igor Muttik To block malicious attacks effectively, security products need to employ all means available to them. ...
How I forced an Android Vulnerability into bypassing MDM restirctions + DIY - Android Malware analysis Zubair Ashraf So you have got an Android malware, but you don't know how to analyze it, ...
IEEE Anti-Malware Support Service (AMSS) Mark Kennedy AMSS is a set of shared support services, created through the collaborative efforts of many ...
Infected.gov Dmitry Gryaznov It is a well-known fact that these days most of malware is spread via the ...
Inside Android banking botnets Roman Unuchek In the last year or so we’ve seen an incredible increase in the number of ...
Lemming Aid and Kool Aid: Helping the Community to help itself through Education Sebastian Bortnik , David Harley There’s been no shortage of attempts to raise awareness of security issues in the community ...
Microsoft Anti-Virus Extortion Expedience or the Extinction of the AV Industry- The Jury Has Reached A Verdict Randy Abrams According to the 2014 Secunia Vulnerability Review of the 13,073 vulnerabilities discovered in 2013. These ...
Mobile Underground Activities in China Lion Gu The mobile Web is significantly changing the world. More and more people are replacing their ...
Modifications of signed executables two years later Alena Varkockova , Igor Glucksmann In 2012 we found, reported and published a problem with Authenticode signatures on PE executable ...
Native Binary – the “Black Magic” of Android World Liang Feng Zhang , Rowland Yu The malicious utilization of native codes such as C and C++ against Android can be ...
Operation Oil Tanker Luis Corrons In the latest years we have seen how Advanced Persistent Threats (APTs) work, targeting high ...
POS Malware: Are we really defenseless? Ciprian Oprisa , George Cabau The recent attack on the Target POS systems that result in more than 100 million ...
Shell Team Six: Zero Day After-Party Gregory Panakkal , Lokesh Kumar The IT security industry is faced with the challenge of dealing with old invasion tactics ...
Stealing the internet, one router at a time Peter Kosinar The number of devices connected to the internet is increasing every day – and even ...
The Internet of Things – Or – Security: The Forgotten Feature Andreas Marx Criminals are exploring the next possibilities to spread their malware on and to broaden their ...
The tale of HesperBOT Peter Kruse , Yurii Khvyl This presentation will uncover a year of intense investigation involving law enforcement in several countries. ...
The Tizen Attack Surface Irfan Asrar Tizen is an open source operating system designed for multiple computing platforms such as smartphones, ...
ZebrAttack: Data Breach via Android OS and App Vulnerabilities Scott Wu , Song Li Scanning QR code image is a popular way to enter information into smart phones, thanks ...