Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed "Small Talks", these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks on civil society to the security changes in the then new Windows 10 operating system.

The Small Talks proved to be very popular and as a result, we decided to keep them on the VB2016 programme in the same format as last year.

ST-Porst.jpg

Sebastian Porst presented at VB2015 and will return to VB2016 with a Small Talk on Android security.

  • As the most widely used mobile operating system, Android is a popular target for malware authors. Sebastian Porst and Jason Woloz from Google's Android Security Team will lead a discussion, aiming to create a dialogue with the security community with the goal of establishing opportunities for collaborative problem solving.

  • The IEEE's Anti-Malware Support Service is one of many collaborative efforts that have sprung from Virus Bulletin talks (in this case, talks at VB2011 and VB2012). Symantec researcher Mark Kennedy, one of the driving forces behind the AMSS, will provide an update on the Taggant system and the Clean-file Metadata eXchange, and will also discuss with the audience where the IEEE might concentrate its efforts in the future.

  • Though it is the country with the largest online population, language and cultural barriers make the Chinese Internet a terra incognita for many security experts. Researchers from Qihoo 360's Helios team will help overcome this problem by discussing their findings on the 'Hook007 Group', possibly the country's largest and oldest cybercrime group.

  • Earlier this week, we wrote about the vast amount of research dedicated to exploit kits. Many of the researchers who carry out this work will be in Denver, and they should be keen to join a session led by Fidelis researcher John Bambernek, where the latest research into exploit kits, including collaborative efforts to tackle them, will be discussed.

  • torlogothumb.pngThere are few security professionals who do not occasionally use the Tor network. But most of them will also have seen how the network is commonly used by cybercriminals to hide their infrastructure. We invited David Goulet, a core member of Tor's development team, to explain to delegates how the network and its 'hidden services' work, after which he will engage in a discussion with the malware research community to find out how the research community and the Tor Project can help each other.

  • Finally, the Clean Software Alliance returns to present a Small Talk. The CSA aims to codify and operationalize industry best practices among the software distribution ecosystem. This Small Talk will be aimed primarily at members of the security community and will focus on the enforcement perspective.

We will also use the Small Talks room to give the authors of the three reserve papers an opportunity to present their research (unless we need them to step in to fill a space on the main programme!).

The call for last-minute papers  presentations that address up-to-the-minute and emerging topics and research – remains open until 4 September, soon after which we will be announcing the final additions to the conference programme.

In the meantime, don't forget to register for VB2016!

VB2016-dates-web.jpg

 

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

$150k in cryptocurrency stolen through combined BGP-DNS hijack

A BGP hijack was used to take over some of Amazon's DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.

Security-focused routers may help to mitigate IoT threats

Various security companies are offering security-focused routers. This is a good trend and may help mitigate a lot of the issues that come with the IoT.

The road to IPv6 is generally smooth but contains a few potholes

Most of the switch from IPv4 to IPv6 will happen seamlessly. But we cannot assume it won't introduce new security issues.

New paper: Powering the distribution of Tesla stealer with PowerShell and VBA macros

Since their return four years ago, Office macros have been one of the most common ways to spread malware. Today, we publish a research paper which looks in detail at a campaign in which VBA macros are used to execute PowerShell code, which in turn…

VB2017 paper: Android reverse engineering tools: not the usual suspects

Within a few years, Android malware has grown from a relatively small threat to a huge problem involving more than three million new malware samples a year. Axelle Apvrille, one of the world's leading Android malware researchers, will deliver a…