VB2021 localhost call for last-minute papers

Posted by    on   Aug 2, 2021

Have you analysed a brand new online threat? Are you involved in cutting edge security research? Are you tasked with securing systems and fending off attacks and developing new ways of working? The call for last-minute papers for VB2021 localhost is now open and we want to hear from you!

VB2021-localhost.png

With threats evolving and research ongoing, we know that a lot of new material has come to light in recent months, so as usual we have set aside a number of speaking slots on the VB localhost programme specifically for 'last-minute' papers that deal with brand new, up-to-the-minute material.

 

What am I required to do if my last-minute paper is selected for VB localhost?

  • You will be required to record a 25-minute presentation (VB will give you full guidance on how to make your recording) and submit it to us no later than 10 September, 0:00 UTC. (This is a hard deadline, to allow for video post-production editing.)
  • If your presentation is on the live programme we will also ask you to be available between the hours of 16:00 - 20:30 UTC on the day on which your presentation is broadcast, in order to take live Q&A.
  • As usual with the last-minute papers, you are not required to write a paper.

 

How do I submit a proposal?

  • Visit the full call for papers and follow the links to the online abstract submission form.

Or

Submit a proposal before August 20 for a chance to get one of the last-minute slots!

(We aim to notify those whose papers have been selected no later than 24 August 2021.)

And of course, to make sure you don't miss out on the event, don't forget to register - for free!

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.

New article: Excel Formula/Macro in .xlsb?

In a follow-up to an article published last week, Kurt Natvig takes us through the analysis of a new malicious sample using the .xlsb file format.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.