More VB Conference papers and videos published

Posted by   Virus Bulletin on   Jan 29, 2016

11 papers and 9 videos added to our website.

In the security industry, we're used to people saying sorry: "sorry we chose a default password of 12345678"; "sorry we didn't look after your personal data better"; "sorry we didn't discover this huge vulnerability earlier"; and so on.

In that context, my reason for apologising is far more mundane. There were some great papers and presentations given at our VB2014 conference in Seattle that we simply haven't yet got around to publishing.

Sorry.

VB2014 Seattle

But better late than never: the following are the remaining papers and presentations. Enjoy!

(If you like what you see here, and are interested in presenting your own research at the upcoming Virus Bulletin conference (VB2016), in Denver 5-7 October 2016, why not submit a proposal? The call for papers is now open.)

An in-depth analysis of abuse on Twitter (Jonathan Oliver, Paul Pajares, Christopher Ke, Chao Chen, Yang Xiang). HTML, PDF.

Evolution of Android exploits from a static analysis tools perspective (Anna Szalay, Jagadeesh Chandraiah). HTML, PDF.

Android packers: facing the challenges, building solutions (Rowland Yu). HTML, PDF.

Linux-based Apache malware infections: biting the hand that serves us all (Cathal Mullaney, Sayali Kulkarni). HTML, PDF.

Notes on click fraud: American story (Peter Kalnai, Jaromir Horejsi). HTML, PDF.

Can we trust a trustee? An in-depth look into the digitally signed malware industry (Adrian-Stefan Popescu, Gheorghe Jescu). HTML, PDF.

It has a EULA, it must be legit (Stefan Catalin Hanu, Stefan Mosoi, Marius Lucaci). HTML, PDF.

How they're getting the data out of your network: a survey of methods used for exfiltration of sensitive data, recommendations for detection and protection (Eric Koeppen). HTML, PDF.

Protecting financial institutions from man-in-the-browser attacks (Xinrang Wang, Yao Zhao). HTML, PDF.

Tech Support Scams 2.0: An inside look into the evolution of the classic Microsoft tech support scam (Jerome Segura). HTML, PDF.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

VB2019 paper: Cyber espionage in the Middle East: unravelling OSX.WindTail

At VB2019 in London, Jamf's Patrick Wardle analysed the WindTail macOS malware used by the WindShift APT group, active in the Middle East. Today we publish both Patrick's paper and the recording of his presentation.

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.