VB2018 preview: Workshops

Posted by   Martijn Grooten on   Sep 28, 2018

The Virus Bulletin Conference is first and foremost a place to learn: about new threats, about the tools used to detect and fight them, and to learn about (and get to know) the people that matter in the fast-changing world of threat intelligence and research.

This year, you can also learn about some essential techniques that are important for any cybersecurity researcher: kernel-mode malware analysis, Android reverse engineering, and AI in cybersecurity.


Dynamic manual analysis of kernel-mode malware

Though analysis of the vast majority of malware samples found these days is fully automated, manual analysis remains essential for those important and often more interesting edge cases. Cisco Talos researcher Vanja Svajcer, a regular VB speaker, will teach the audience how to perform dynamic manual analysis of kernel-mode malware, in particular using WinDbg.

Vanja says attendees will benefit from the hands-on examples if they are able to bring a laptop set up with Windows debugging tools.


Android reverse engineering

Android malware has become a serious and varied threat in recent years, and thus a workshop by Fortinet researcher Axelle Apvrille (also a regular VB speaker) on Android malware analysis is an exciting addition to the programme. Her workshop is, as the title suggests, 'for the brave', and will consists of several guided labs to cover subjects such as dealing with obfuscated samples and writing Radare2 scripts.

For this workshop, it will be necessary to bring a laptop that has been prepared by following these instructions.


Artificial intelligence in cybersecurity

Finally, artificial intelligence is a hot topic in security and beyond, and it is a particular focus of the city of Montreal that hosts VB2018. It is thus fitting that Benoît Hamelin, from local company Element AI, will host a workshop on AI and how it support efforts towards solving certain classes of cybersecurity problems.

To benefit from Benoît's hands-on examples, participants are recommended to bring a laptop in order to use the cloud-based Colaboratory.

All three workshops last 90 minutes and take place in the Small Talks room. No special registration or additional payment is required, but you must, of course, be registered for VB2018 itself!

VB2018-withdate-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

VB2019 paper: Cyber espionage in the Middle East: unravelling OSX.WindTail

At VB2019 in London, Jamf's Patrick Wardle analysed the WindTail macOS malware used by the WindShift APT group, active in the Middle East. Today we publish both Patrick's paper and the recording of his presentation.

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.