More VB Conference papers and videos published

Posted by   Virus Bulletin on   Jan 29, 2016

11 papers and 9 videos added to our website.

In the security industry, we're used to people saying sorry: "sorry we chose a default password of 12345678"; "sorry we didn't look after your personal data better"; "sorry we didn't discover this huge vulnerability earlier"; and so on.

In that context, my reason for apologising is far more mundane. There were some great papers and presentations given at our VB2014 conference in Seattle that we simply haven't yet got around to publishing.


VB2014 Seattle

But better late than never: the following are the remaining papers and presentations. Enjoy!

(If you like what you see here, and are interested in presenting your own research at the upcoming Virus Bulletin conference (VB2016), in Denver 5-7 October 2016, why not submit a proposal? The call for papers is now open.)

An in-depth analysis of abuse on Twitter (Jonathan Oliver, Paul Pajares, Christopher Ke, Chao Chen, Yang Xiang). HTML, PDF.

Evolution of Android exploits from a static analysis tools perspective (Anna Szalay, Jagadeesh Chandraiah). HTML, PDF.

Android packers: facing the challenges, building solutions (Rowland Yu). HTML, PDF.

Linux-based Apache malware infections: biting the hand that serves us all (Cathal Mullaney, Sayali Kulkarni). HTML, PDF.

Notes on click fraud: American story (Peter Kalnai, Jaromir Horejsi). HTML, PDF.

Can we trust a trustee? An in-depth look into the digitally signed malware industry (Adrian-Stefan Popescu, Gheorghe Jescu). HTML, PDF.

It has a EULA, it must be legit (Stefan Catalin Hanu, Stefan Mosoi, Marius Lucaci). HTML, PDF.

How they're getting the data out of your network: a survey of methods used for exfiltration of sensitive data, recommendations for detection and protection (Eric Koeppen). HTML, PDF.

Protecting financial institutions from man-in-the-browser attacks (Xinrang Wang, Yao Zhao). HTML, PDF.

Tech Support Scams 2.0: An inside look into the evolution of the classic Microsoft tech support scam (Jerome Segura). HTML, PDF.



Latest posts:

VB2016 paper: The TAO of Automated Iframe Injectors - Building Drive-by Platforms For Fun

We publish Aditya K. Sood's VB2016 paper on the use of iframe injectors by cybercriminals to deliver drive-by downloads.

“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker

An interview with VB2016’s keynote speaker Christine Whalley - Director, Governance and IT Risk Management at Pfizer

Throwback Thursday: Following the Breadcrumbs

In 1999, Christine Orshesky described how one large organization decided to find out how and where the viruses within it were being obtained so it could do more to protect its networks.

VB2016 preview: Cryptography mistakes in malware

At VB2016, two talks will discuss mistakes made by malware authors in cryptographic implementations. Ben Herzog and Yaniv Balmas will present a paper in which they look at a number of these mistakes, while Malwarebytes researcher hasherezade will…

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about GPS, about the conference, and about his ultimate dinner party.