More VB Conference papers and videos published
Posted by Virus Bulletin on Jan 29, 2016
11 papers and 9 videos added to our website.
In the security industry, we're used to people saying sorry: "sorry we chose a default password of 12345678"; "sorry we didn't look after your personal data better"; "sorry we didn't discover this huge vulnerability earlier"; and so on.
In that context, my reason for apologising is far more mundane. There were some great papers and presentations given at our VB2014 conference in Seattle that we simply haven't yet got around to publishing.
But better late than never: the following are the remaining papers and presentations. Enjoy!
(If you like what you see here, and are interested in presenting your own research at the upcoming Virus Bulletin conference (VB2016), in Denver 5-7 October 2016, why not submit a proposal? The call for papers is now open.)
An in-depth analysis of abuse on Twitter (Jonathan Oliver, Paul Pajares, Christopher Ke, Chao Chen, Yang Xiang). HTML, PDF.
Evolution of Android exploits from a static analysis tools perspective (Anna Szalay, Jagadeesh Chandraiah). HTML, PDF.
Android packers: facing the challenges, building solutions (Rowland Yu). HTML, PDF.
Linux-based Apache malware infections: biting the hand that serves us all (Cathal Mullaney, Sayali Kulkarni). HTML, PDF.
Notes on click fraud: American story (Peter Kalnai, Jaromir Horejsi). HTML, PDF.
Can we trust a trustee? An in-depth look into the digitally signed malware industry (Adrian-Stefan Popescu, Gheorghe Jescu). HTML, PDF.
It has a EULA, it must be legit (Stefan Catalin Hanu, Stefan Mosoi, Marius Lucaci). HTML, PDF.
How they're getting the data out of your network: a survey of methods used for exfiltration of sensitive data, recommendations for detection and protection (Eric Koeppen). HTML, PDF.
Protecting financial institutions from man-in-the-browser attacks (Xinrang Wang, Yao Zhao). HTML, PDF.
Tech Support Scams 2.0: An inside look into the evolution of the classic Microsoft tech support scam (Jerome Segura). HTML, PDF.
Perhaps the question we should be asking about WannaCry is not "why do so many organizations allow unpatched machines to exist on their networks?" but "why doesn't patching work reasonably well most of the time?"
The WannaCry ransomware has affected many organisations around the world, making it probably the worst and most damaging of its kind. But modern security is not necessarily powerless against such threats.
This week sees the 11th International CARO Workshop taking place in Krakow, Poland – a prestigious annual meeting of anti-malware and security experts. As a founding member of CARO, Fridrik Skulason was well placed, in August 1994, to shed some light…
Malicious advertising, a.k.a. malvertising, has evolved tremendously over the past few years to take a central place in some of today’s largest web-based attacks. It is by far the tool of choice for attackers to reach the masses but also to target…
As DDoS attacks become costlier to fix and continue to increase in both number and diversity, we turn back the clock to 2000, when Aleksander Czarnowski took a look at the DDoS tools of the day.