VB2015: some important information

Posted by   Virus Bulletin on   Aug 28, 2015

Last-minute papers, steganography competition and foosball tournament.

We're just a little over a month away from the beginning of VB2015, the 25th Virus Bulletin International Conference. If you haven't already registered, why not do so now?

Whether you have already registered or are thinking of doing so, there are some important things that are worth knowing about the event.

Call for last-minute papers

First, there is the call for last-minute papers. The ten slots set aside in the programme for 'last-minute' papers are indended for talks on current and emerging ('hot') topics. We are now seeking proposals for those speaking sessions.

The deadline for last-minute paper proposals is Thursday 3 September. The selection committee will act very quickly and we plan to let those selected know on the morning (European time) of Tuesday 8 September (a little more than three weeks before the start of the event).

Those selected are asked to give a 30-minute talk on Thursday 1 October — since these sessions are chosen so close to the event, we don't ask for a written paper for the last-minute presentations. We do, however, give speakers a free ticket for the conference!

Steganoprague

If you've already registered for the conference and you like a bit of a puzzle, do have a look at 'Steganoprague': a two-part competition involving steganography, the first part of which is played prior to the conference. The competition is open to individuals and/or teams, but to be in the running for the prize, competitors must be registered delegates of VB2015.

  Charles Bridge in Prague, the image used as a basis for the "Steganoprague" puzzle. Photo by Valerii Tkachenko, from Wikimedia Commons, released under the CC-BY-2.0 licence.

Foosball

Perhaps your idea of having fun doesn't always include zeros and ones — in which case you might want to enter into the hotly contended VB2015 foosball (table football) tournament, hosted by G Data. The matches promise to be exciting, closely fought and adrenaline-filled and will stretch the teams to their technical and mental limits!

Programme

Regardless of whether you submit a last-minute paper, take part in the competition or form a foosball team, we hope you'll join us in Prague. After all, besides all the fringe events, the programme — which includes 38 papers on a wide range of security topics, from drones to elephants — is no doubt the best advertisement for the conference. But should you need to convince your budget holder, we have put together a list of reasons to attend on a separate page.

Make sure you follow us on Twitter or Facebook for the latest updates or email us at conference@virusbtn.com if you have any questions.

We look forward to seeing you in Prague!



Posted on 28 August 2015 by Martijn Grooten
twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

VB2018 preview: From drive-by download to drive-by mining

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Red Eyes threat group targets North Korean defectors

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on…

VB announces Threat Intelligence Summit to take place during VB2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.