More VB Conference papers and videos published

Posted by   Virus Bulletin on   Jan 29, 2016

11 papers and 9 videos added to our website.

In the security industry, we're used to people saying sorry: "sorry we chose a default password of 12345678"; "sorry we didn't look after your personal data better"; "sorry we didn't discover this huge vulnerability earlier"; and so on.

In that context, my reason for apologising is far more mundane. There were some great papers and presentations given at our VB2014 conference in Seattle that we simply haven't yet got around to publishing.

Sorry.

VB2014 Seattle

But better late than never: the following are the remaining papers and presentations. Enjoy!

(If you like what you see here, and are interested in presenting your own research at the upcoming Virus Bulletin conference (VB2016), in Denver 5-7 October 2016, why not submit a proposal? The call for papers is now open.)

An in-depth analysis of abuse on Twitter (Jonathan Oliver, Paul Pajares, Christopher Ke, Chao Chen, Yang Xiang). HTML, PDF.

Evolution of Android exploits from a static analysis tools perspective (Anna Szalay, Jagadeesh Chandraiah). HTML, PDF.

Android packers: facing the challenges, building solutions (Rowland Yu). HTML, PDF.

Linux-based Apache malware infections: biting the hand that serves us all (Cathal Mullaney, Sayali Kulkarni). HTML, PDF.

Notes on click fraud: American story (Peter Kalnai, Jaromir Horejsi). HTML, PDF.

Can we trust a trustee? An in-depth look into the digitally signed malware industry (Adrian-Stefan Popescu, Gheorghe Jescu). HTML, PDF.

It has a EULA, it must be legit (Stefan Catalin Hanu, Stefan Mosoi, Marius Lucaci). HTML, PDF.

How they're getting the data out of your network: a survey of methods used for exfiltration of sensitive data, recommendations for detection and protection (Eric Koeppen). HTML, PDF.

Protecting financial institutions from man-in-the-browser attacks (Xinrang Wang, Yao Zhao). HTML, PDF.

Tech Support Scams 2.0: An inside look into the evolution of the classic Microsoft tech support scam (Jerome Segura). HTML, PDF.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Research shows web security products perform well against exploit kits

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Throwback Thursday: Olympic Games

In 1994, along with the Olympic Games came an Olympic virus, from a group of Swedish virus authors calling themselves ‘Immortal Riot’. We look back at Mikko Hyppönen's analysis in the VB archive.

VB2016 call for last-minute papers opened, discounts announced

Announcing the VB2016 call for last-minute papers and a number of discounts on the conference registration rate.

Guest Blog: Malicious Scripts Gaining Prevalence in Brazil

In the run up to VB2016, we invited the conference sponsors to write guest posts for our blog. In the second of this series, ESET's Matías Porolli writes about malicious Visual Basic and JavaScript gaining prevalence in Brazil.

Romanian university website compromised to serve Neutrino exploit kit

The website of the Carol Davila University of Medicine and Pharmacy has been compromised to inject a hidden iframe into the site's source code that serves the Neutrino exploit kit and may infect visitors with ransomware.