Security experts pool ideas at European conferences

Posted by   Virus Bulletin on   May 11, 2009

Research and expertise shared at CARO and AMTSO meetings.

Last week saw two major gatherings of top security and anti-malware experts from across the globe, as the third annual CARO conference was held in Budapest, Hungary, followed by a well-attended meeting of the AMTSO testing standards group, which saw the ratification of several significant documents.

CARO The CARO meeting focused on the major issue of vulnerabilities and exploits, with insights into the latest research and discoveries shared with an audience made up of leading technical staff from most of the major players in the anti-malware industry. Issues with specific software and operating systems, the patching problem, flaws in security solutions and even undocumented features in the PE file format were covered in a wide-ranging programme of talks, and discussed in depth during group Q&A sessions and in the surrounding corridors. The latest research on the notorious Conficker worm were shared, along with analysis of other topical issues such as PDF viewer exploits.

The third outing for this tightly focused conference, hosted this time by Hungarian security firm VirusBuster, proved as successful as the previous meetings, which covered packing and obfuscation in Amsterdam in 2008 and testing in Reykjavik in 2007.

AMTSO Many of the delegates remained in Budapest for the second half of the week, which saw another meeting of the AMTSO group, founded after discussions begun at the Reykjavik conference. Over 40 delegates, representing security vendors, testing labs, publications and academia, debated the future of anti-malware testing, ratifying two new guidelines documents and a process for analysing and commenting on how well tests conform to the principles already laid down.

Insights into testing "in-the-cloud" technologies and validating malware samples were collated into the new guidelines papers, which will support the earlier documents providing advice on dynamic testing and a list of the fundamental principles all testers should abide by. The members also approved plans to provide official support or condemnation of published tests and reviews highlighted by members as worthy of attention. The latest documents should soon be made public on the group's website, a radical redesign of which was also approved of by members. The second part of the meeting saw work commence on a range of new projects.

Many security experts will be staying on in Europe for further discussions, with this week seeing the annual EICAR conference in Berlin and the APWG's 'Counter eCrime Operations' summit in Barcelona. Details of these upcoming events are here and here, while comment on last week's meetings is in blog entries here, here, here and here. A full report will appear in next month's issue of Virus Bulletin (publication date 1 June).

Posted on 11 May 2009 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.