Virus Bulletin 2003 Sept. 25, 2003 to Sept. 26, 2003, Toronto, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How do advanced Win32 worms really work? Kurt Natvig "How do advanced Win32 worms really work?I will walk through the big viruses spreading towards ...
Security awareness: the human factor Fiona Naylor "Security awareness: the human factor The Australia and New Zealand Banking Group Limited has approximately ... Security
Polymorphic shellcode: advances in recent years Aleksander Czarnowski "Polymorphic shellcode: advances in recent yearsPolymorphic shellcode is no longer just a research topic - ... Security
Real-time WildList Bruce Hughes Real-time WildListThe Real-time WildList (RTWL) is the first step forward that will take the WildList ... Security
Smarter ways to fight smarter threats Conrad Herrmann Smarter ways to fight smarter threats Code Red, Nimda, Bugbear, SQL Slammer... These threats wreaked ... Security
Spam - past and future Costin Raiu "Spam - past and future Even if viruses and Trojans are still the holders for ... Security
Corporate threat assessment matrix Chuck Springer "Corporate threat assessment matrix In this new world of blended threats, how can we adequately ...
Taking down the Internet Dmitry Gryaznov Taking down the Internet Today, with hundreds of millions of not-so-computer-savvy users having broadband access ... Security
Fact, fiction and managed anti-malware services David Harley "Fact, fiction and managed anti-malware services Not all of the assumptions on which the malware ... Security
Customer understanding, opinion and expectation - the least understood area of anti-virus David Perry "Customer understanding, opinion and expectation - the least understood area of anti-virus Many anti-virus customers ... Security
Educating the users David Phillips "Educating the users Graham Cluley mentions in VB Magazine, Jan 2002:'we can expect to see ... Security
Malicious threats and vulnerabilities in instant messaging Eric Chien Malicious threats and vulnerabilities in instant messagingInstant messaging is an up-and-coming threat as a carrier ...
The single engine vs. multiple engine debate Invited Panel The single engine vs. multiple engine debate An invited panel of speakers will debate the ... Security
Defeating polymorphism through code optimization Frederic Perriot Defeating polymorphism through code optimization In the last decade dealing with ever more complex polymorphic ... Security
XML heaven Gabor Szappanos "XML heaven Office 2003 introduced a new document format, the single-file XML storage, which stress ... Security
Detecting hoaxes as the spam they truly are Heather Goudey "Detecting hoaxes as the spam they truly are When a customer gets a virus warning ... Security
Incident management Jeannette Jarvis "Incident management Your company has just been 'slammed' by the latest virus and it is ... Security
Dazuko: an open solution to facilitate 'on-access' scanning John Ogness "Dazuko: an open solution to facilitate 'on-access' scanning One of the most fundamental forms of ... Security
To do or not to do: anti-virus accessories Jong Purisima "To do or not to do: anti-virus accessoriesAs the evolution of the anti-virus product continues, ... Security
Anti-virus support, the need for making a career field Kenneth Bechtel Anti-virus support, the need for making a career field This presentation will show why the ... Security
V3Genie system: an automated multi-scanner system Kyu-beom Hwang "V3Genie system: an automated multi-scanner systemThere are nearly no days that we don't receive new ... Security
Anti-virus technology: filtering the legal issues Leif Gamertsfelder Anti-virus technology: filtering the legal issues This presentation will explore the legal issues involved in ... Security
Inside VBA6 decompiler L'ubos Vrtik Inside VBA6 decompilerThe process of obtaining the source code for modules created in MS Office ... Security
Malware and anti-virus on 64-bit platforms Myles Jordan "Malware and anti-virus on 64-bit platformsWith the approach of consumer level 64-bit computing platforms (ie. ... Security
Worm charming: taking SMB Lure to the next level Martin Overton "Worm charming: taking SMB Lure to the next level Over the last two years, worms ... Security
.NET support in UNIX Marius van Oers ".NET support in UNIXWith .NET, instead of native code it is also possible to provide ... Security
An epidemiological model of virus spread and cleanup Matthew M. Williamson An epidemiological model of virus spread and cleanupWhile it is relatively straightforward to compare the ...
A law enforcement perspective Nina Gaubert "A law enforcement perspectiveThe presentation will cover the following: The role of the NHTCU and ... Security
Prevention vs cure vs freedom: achieving the business balance Peter Cooper Prevention vs cure vs freedom: achieving the business balance The virus threat has changed significantly ... Security
Convergence of virus writers and hackers: fact or fantasy? Sarah Gordon Convergence of virus writers and hackers: fact or fantasy? The theory of planned behaviour (TPB) ...
OpenOffice security Sami Rautiainen OpenOffice security OpenOffice, the open office suite is available for Linux, Windows and Solaris, with ... Security
CAMDIER project Urs Gattiker "CAMDIER project Cyber Attack Methods Detection & Information Exploitation (CAMDIER) is a pan European project ... Security