Virus Bulletin 2011 Oct. 5, 2011 to Oct. 7, 2011, Barcelona, Spain

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The dangers of per-user COM objects in Windows Jon Larimer "Microsoft Windows allows for the registration of COM objects in the user hive of the ... Security
Android malware is on the rise Timothy Armstrong " The Android operating system is following an explosive growth pattern, and has recently surpassed ... Security
Thriving business model around free security (sponsor presentation) Milos Korenko "A great man once said, 'A vision without action is just a dream. Action without ... Security
Computer security - a social survival skill (sponsor presentation) Randy Abrams From the beginning of civilization certain skills were deemed critical to the survival of the ... Security
Traffic direction systems as a factor of targeted infection Max Goncharov "Directing traffic to cash in on referrals is a common and legitimate method of making ... Security
Fast fingerprinting of OLE2 files: heuristics for detection of exploited OLE2 files based on specification non-conformance Stephen Edwards Today, the main class of malicious OLE2 files currently seen by SophosLabs exploit vulnerabilities in ...
Cell phone money laundering Denis Maslennikov "In Russia, the vast majority of cell phone SIM cards are prepaid. One of the ... Security
Understanding consumer attitudes on anti-virus software (sponsor presentation) Greg Dale Greg Dale, Chief Operating Officer, comScore, Inc., will talk on understanding consumer attitudes on anti-virus ... Security
Static shellcode analysis and classification Aleksander Czarnowski "Historically, the term 'shellcode' referred to short shell executing binary code in order to exploit ... Security
Bindex 2.0 Tim Ebringer "We present the algorithms, applications and new experiments based on the next generation of Bindex, ... Security
Following the tracks: understanding snowshoe spam Brett Cove "The decline in volume of botnet-generated spam has dominated the spam news recently, but the ... Security
Web browsers: a history of rogues Christopher Boyd "Web browsers are all around us, yet most users probably don't stop to think about ... Security
Strategies for prioritization of malicious URL re-evaluation Kyle Zeeuwen We perform a study of Fake AV distribution networks advertised via SEO poisoning that affect ...
A second life in a virtual environment: from simple socialization to revealing sensitive information Sabina raluca Datcu " This study focuses on the phenomenon of disclosing private information to online friends who ... Security
Your reputation precedes you Gunter Ollmann "The threat landscape is increasingly dynamic. Legitimate servers are being hacked and abused into hosting ... Security
The unexamined life-missing metrics of malware David Perry "There are so many metrics, so many stats produced in this industry, and almost all ... Security
Fake but free and worth every cent Robert Lipovsky "In his 2009 paper 'Is there a lawyer in the lab?', Juraj Malcho discussed the ...
Firing the roast - Java is heating up again Kurt Baumgartner "With the recent explosion in prevalence of both client-side Java exploitation and Android malware development, ... Security
Daze of whine and neuroses (but testing is FINE) David Harley "According to Aerosmith (not to mention The Italian Job), FINE is an acronym for (in ...
Clustering disparate attacks: mapping the activities of the advanced persistent threat Martin Lee The advanced persistent threat is one of the most difficult challenges faced by the anti-virus ...
1 + 1 != 2 in malware scanning Taeil Goh No single anti-malware product has delivered 100% detection of threats, and this fact will most ... Security
File-fraction reputation based on digest of high granularity Ethan yx Chen "How to decide whether a file is benign or malicious has been a critical problem ... Security
Malware mining Igor Muttik "Heuristic detection methods are well established and well known in the AV industry. In the ... Security
An OpenBTS GSM replication jail for mobile malware Axelle Apvrille There is one golden rule in the anti-virus industry that all AV analysts are very ... Security
A look at the cybercrime ecosystem and the way it works Dmitry Bestuzhev " In the last few years, cybercrime has evolved into a truly organized crime ecosystem ... Security
2020 threats: too far away to discuss or too close to ignore? Maksym Schipka "We live in interesting times. The pace of change in the IT industry is immense: ...
Bonnie and Clyde: the crazy lives of the Brazilian bad guys Fabio Assolini " Igor Soares da Silva and his wife Emily, both 25 years old, together stole ... Security
Mobile security top 10 issues to consider Jason Steer "The inevitable has happened. 2011 has become the year of mobile malware. All the pieces ... Security
Same botnet, same guys, new code Pierre-marc Bureau There are many factors that make the Win32/Kelihos malware family stand out. First of all, ... Security
Cyber attacks: how are Mac OS X and iOS users playing the role? Methusela cebrian Ferrer "While a proliferation of cyber attack tools and expertise are widely available for the Windows ... Security
Analysing the packer layers of rogue anti-virus programs Rachit Mathur It is well known that fake AV programs have become a real problem to deal ...
Lessons learned while sinkholing botnets - not as easy as it looks! Rainer Link "Botnets are a well-known security threat for businesses and end-users alike. They are made up ...
Dissecting Flash with EASE (Experimental ActionScript Emulator) Bing Liu "In today's online world, Adobe Flash's ubiquity is hardly deniable. The reasons for this success ... Security
Top exploits of 2011 Holly Stewart At the end of 2010, a marked rise in the exploitation of Java vulnerabilities took ... Security
A study of malicious attacks on Facebook Maria Revilla " Social networking sites have, beyond doubt, made it into today's popular culture. They have ... Security
Automating social engineering Alexandru catalin Cosoi " Social engineering is the act of manipulating people into performing certain actions or divulging ...
Enhancing filtering proactivity with reverse IP and reverse Whois queries Claudiu cristian Musat The presented work outlines a system that employs reverse IP and reverse Whois queries to ...
Browser exploit packs - exploitation paradigm Aditya K Sood "Malware infection is proliferating day by day. In spite of the new advanced protection features, ...
X is not enough! Grab the PDF by the tail! Jindrich Kubec "Everyone in the computer security world knows about the dangers that come with the vulnerabilities ...
GPGPU and threat analysis Takashi Katsuki "The CPU clock speed wars are now over, and multicore CPUs are now standard. For ... Security
How to teach people to be aware of cyber security Terry Zink "In 2010, Terry Zink presented an paper entitled 'The Psychology of Spamming', which covered how ... Security
Predicting the future of stealth attacks Aditya Kapoor "Just when we started hoping that stealth malware would be on the decline (since almost ...
Malicious tools and techniques in a politicized, militarized cyberspace Eli Jellenc " This presentation (based on existing VeriSign-iDefense research projects) examines the divergence between newer politico-strategic ... Security
A survey of Chinese DDoS malware Jeff Edwards This paper surveys the diverse landscape of Trojan horse families populating a specific niche in ...
Keynote address: The m00p investigation: law enforcement and the anti-virus industry working in partnership Bob Burls "This presentation is a case study into an investigation against an international malware writing group. ...
Rise and fall of the Koobface gang Jan Droemer " The Koobface botnet - a product of the self proclaimed 'Ali Baba & 4', ...
Social threats: how fragile we are George lucian Petre As a common element for all mobile platforms and browsers, social networks keep drawing the ... Security