VB2018 call for papers now open!

Posted by   Martijn Grooten on   Jan 23, 2018

The call for papers for VB2018, the 28th Virus Bulletin International Conference, which will take place in Montreal, Canada, 3-5 October 2018, is now open!

We welcome submissions on all aspects of digital security, from the very technical to the more general, whether you are an experienced speaker or a first-time presenter, and whether you are based in Montreal or the other side of the world.

VB2018-withdate-325w.jpg

The VB Conference has a broad focus, but has always concentrated on analysing and preventing real-world attacks: from malware analyses to APT campaign investigations; from tools that help with research to new detection methods; from attacks against the BIOS to research into global infection rates. We also very much welcome 'out-of-the-box' submissions.

We are particularly interested in hearing from speakers who can share their experience from the real world, who are employed by businesses, governments or NGOs and tasked with securing systems and fending off attacks.

The deadline for submissions is 18 March 2018.

You can read more on the CFP here, or go directly to our Extranet, where you can submit papers.

A small number of slots on the conference programme will be reserved for very 'hot' research topics; the call for these 'last-minute' papers will go out in the summer. Registration for the conference will open in April 2018.

Should you have any queries about the call for papers, if you have an idea that doesn't fit the standard format, or just want to talk over your proposal prior to submitting, please don't hesitate to email me at martijn.grooten@virusbulletin.com.

We look forward to hearing from you!

VB2018-speakers.jpg

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.