Virus Bulletin 2009 Sept. 23, 2009 to Sept. 25, 2009, Geneva, Switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Using the wisdom of crowds to address the malware long tail Carey Nachenberg "The signature-based anti-virus approach which has served us for the past 20 years was never ...
A spam novelty detection system Claudiu cristian Musat Spam keeps changing, but so far there have not been any quantitative studies to determine ...
Volume of threat: the AV update deployment bottleneck Wei Yan As cyber criminals continue to advance their malware development skills, the security industry has responded ...
Mobile malware/security iphone in the enterprise Jason Carpenter This presentation will discuss the risks of running iphones in a corporate environment. More and ... Security
Profiling hackers: real data, real experiences, wrong myths Raoul "Nobody" Chiesa "Imagine being able to preview an attacker's next move based on the traces left on ... Security
Hitting the 'up to date' bulls eye Steven Ginn "Signature-based anti-malware products are only as strong as the definition files deployed with them. With ... Security
How to recover virtualized x86 instructions by Themida Zhenxiang jim Wang In recent years, we have started to see the emergence of third-generation packer technology used ... Security
The hackpacker guide: an in-depth look into custom run-time packers Xu (kyle) Yang "Today's threat landscape is characterized by the utter prevalence of 'packed' malware: nearly 60% of ... Security
I can't go back to yesterday, because I was a different person then Chun Feng "System Restore hardware and software have been widely implemented, and are commonly used by computer ... Security
Spam and legislation Darya Gudkova Spam - we all get it. And yet we all have effective filters to protect ...
Whatever happened to the unlikely lads? A hoaxing metamorphosis David Harley "Once upon a time the most problematic chain emails were virus hoaxes, as exemplified by ...
Misusing trust: search engines targeted to deliver malware Parveen Vashishtha "This paper will outline various methods employed by malware authors to use search engines as ... Security
Is there a lawyer in the lab? Juraj Malcho "With the broadening possibilities and the ever-growing number of computer users, many applications are being ... Security
PE-probe: leveraging packer detection and structural information to detect malicious portable executables M. zubair Shafiq "Since the dawn of the new millennium, there has been an exponential increase in the ...
Last-minute presentations: 10:40 Bankers "10:40 - 11:10 Brazil: land of plentiful bankers, Dmitry Bestuzhev, Kaspersky Lab Download slides. Anyone ...
Last-minute presentation: 11:40 Koobface The real face of Koobface, Ryan Flores, Joey Costoya, Jonell Baltazar, Trend Micro Nothing encapsulates ...
AntiRE en masse Kurt Baumgartner "From Autorun to Zbot, behavioural technologies ignore the most effective evasion strategies implemented in malware ... Security
A closer look at Mac OS X threats Methusela cebrian Ferrer "Most users believe in the contention that every Mac is secure [1]. Although over the ... Security
'I am not a numero!': assessing global security threat levels Bryan Lu Late last year Gartner analyst Greg Young wrote a blog post about the varying worldwide ... Security
Detecting malicious documents with combined static and dynamic analysis Carsten Willems "Malicious documents, i.e. documents that contain a malicious payload (e.g. a keylogger) became a serious ...
When web 2.0 sneezes, everyone gets sick Stephan Tanase "Web 2.0 applications have become increasingly popular among Internet users in the past few years. ... Security
Brazen black hats: how we fight online fraud in a socially networked world Vipul Sharma "Our research indicates that identical bots are being used for different types of online fraud ... Security
A fractal approach to social network spam detection Alexandru catalin Cosoi "Web 2.0 is all about social networks. It's all about user interaction, simplicity and usability. ...
The partnerka - what is it, and why should you care? Dmitry Samosseiko "Scareware, 'Canadian pharmacy' spam, adult sites, comment spam on forums and blogs - we've seen ... Security
Gimme me all your money! Darya Bronnikova Recently, spam has increasingly been the carrier not only of advertising information, but also of ...
URLCheck: making the world a safer place Sorin Mustaca "Do you want to know how challenging it is to make the world safer by ...
Socialnetworkeering: do you know who your friends really are? Andrew Lee "Social networks have become a fact of web life and many of us will have ...
Cyber-insurance: a financial perspective to incident response Pascal Lointier "Based on a non-profit French survey, most SMI-SMB don't conduct a risk assessment even though ... Security
Win32/Sality network activity Arkady Kovtun "Since 2003 anti-virus companies have been detecting a Sality polymorphic virus, but recently there has ... Security
Firefox malware, when your browser bites you Candid Wueest "Firefox is a very popular browser. Its open designed framework makes it easy to extend ...
Fighting cybercrime: technical, juridical, and ethical challenges Guillaume Lovet "Since the massive rise of cybercrime in 2005, which now steadily drains several billion dollars ... Security
Why 'in-the-cloud' scanning is not a solution Maik Morgenstern "Currently, 'in the cloud' services are praised as the Holy Grail and the future of ...
ANUBIS - ANalyzing Unknown BInarieS - the automatic way Thomas Mandl "The increasingly huge number of new malware samples challenges every analysis team, regardless of whether ...
JavaScript security: the elephant running in your browser John Graham-cumming "Visit any major website, such as a bank or a retailer, and your web browser ... Security
Virtual machines for real malware capture and analysis Martin Overton "Virtual machines are widely used by malcode researchers to analyse new malware or to see ... Security
Malware on a mission Amir Fouda "The consensus is in: money is one of the major factors that motivates an average ... Security
Blast from the past: application of the MS08-067 exploit in real world malware Elda Dimakiling Every so often, a vulnerability is discovered in an operating system that makes it possible ...
Tales from cloud nine Mihai Chiriac "At last year's VB conference we promised to answer a set of questions concerning the ... Security
Malice through the looking glass: behaviour analysis for the next decade Jeff Debrosse Most VB conference attendees have a major interest in malicious code. Often they focus on ...
The cloud or the mist? Marian Radu "There is no doubt that the Internet has changed the way we live our lives. ...
The modern rogue - malware with a face Hamish O'Dea "Over the past year we have seen a significant increase in reports of the type ... Security
Social networks: 'Hit all once' - attackers' perspective Swanand dattaram Shinde "Social networking sites have created distinct ways in which to communicate and share information, which ... Security
Modern day magic on the Internet Greg Day "Wikipedia defines social engineering as 'based on specific attributes of human decision-making known as cognitive ... Security
How to reclaim your sender reputation Terry Zink "One of the serious spam problems today that legitimate mailers face is reputation hijacking. When ... Security
Botnet-powered SQL injection attacks: a deeper look within David Maciejak "Looking back, the past year has seen botnet-powered SQL injection attacks reaching a rampant level, ...
Challenges in kernel-mode memory scanning Aditya Kapoor "Recent times have seen a rapid adoption of kernel-mode techniques among malware. Most new threats ...
The CURSE of anti-spam testing Martijn Grooten "Although email spam has been pestering end-users for more than a decade and anti-spam solutions ... Security
Anti-Malware Testing Standards Organization (AMTSO): the status right now Righard J. Zwienenberg Most testers have been sticking to the same methodologies (if any) for too long. These ... Security
Keynote address: Reforming the landscape Eric Davis "Eric Davis, Google's Head of Anti-Malvertising, will explore structural changes that could realign the current ... Security
Last-minute paper reserve: Fragmented distribution attack Anoirel Issa "Through the years there has been a constant evolution of anti-virus evasion techniques. One of ... Security
Last-minute paper reserve: The Waledac botnet: understanding it and breaking it Pierre-marc Bureau "The Waledac malware family clearly is Storm Worm 2.0: The code for both families is ...