Call for Papers: VB2016 Denver

Posted by   Virus Bulletin on   Dec 22, 2015

VB seeks submissions for the 26th Virus Bulletin Conference.

Virus Bulletin is seeking submissions from those wishing to present papers at VB2016, which will take place 5 to 7 October 2016 at the Hyatt Regency Denver Hotel in Denver, Colorado, USA.

Originally started as an annual gathering of anti-virus experts, the VB conference has since evolved to become one of the world's leading security conferences, covering a broad range of topics in the realm of IT security. It is also one of the longest-running security conferences, and will celebrate its 26th edition in 2016.

The conference will include a programme of 30-minute presentations running in two concurrent streams. Presentations vary from the very technical to those aimed at a broader security audience. As in previous years, submissions are invited on topics that fall into any of the following areas:

  • Malware & botnets
  • Anti-malware tools & methods
  • Mobile devices
  • Spam & social networks
  • Hacking & vulnerabilities
  • Network security

A more detailed list of topics, suggestions and the full call for papers can be found here.

The deadline for submission of proposals is Friday 18 March 2016. Abstracts should be submitted via the online abstract submission system.

Posted on 22 December 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.