Wednesday 4 October, 2017

Red room

Green room

Small talks

08:30 - 10:00   Wednesday 4 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
10:30 - 10:50   Wednesday 4 October
VB2017 opening address

(takes place in the Green room)
10:50 - 11:30   Wednesday 4 October
Keynote address: Inside Cloudbleed
John Graham-Cumming (Cloudflare)

(takes place in the Green room)
11:30 - 12:00   Wednesday 4 October
Have you scanned your BIOS recently?
Aditya Kapoor (Cylance)
11:30 - 12:00   Wednesday 4 October
BPH exposed - RBN never left they just adapted and evolved. Did you?
Dhia Mahjoub (Cisco Umbrella (OpenDNS))
Jason Passwaters (Intel471)
12:00 - 12:30   Wednesday 4 October
Getting under the skin: an in-depth look at MSIL malware obfuscation techniques and strategies for deobfuscation
Kaarthik Muthukrishnan (K7 Computing)
12:00 - 12:30   Wednesday 4 October
Walking in your enemy's shadow: when fourth-party collection becomes attribution hell
Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)
12:30 - 14:00   Wednesday 4 October
L   U   N   C   H
14:00 - 14:30   Wednesday 4 October
Nine circles of Cerber
Stanislav Skuratovich (Check Point Software Technologies)
Neomi Rona (Check Point Software Technologies)
14:00 - 14:30   Wednesday 4 October
Modern reconnaissance phase on APT – protection layer
Paul Rascagneres (Cisco Talos)
Warren Mercer (Cisco Talos)
14:30 - 15:00   Wednesday 4 October
Dridex v4 - AtomBombing and other surprises
Magal Baz (IBM)
14:30 - 15:00   Wednesday 4 October
TBA
Claudio Guarnieri (Amnesty International)
15:00 - 15:30   Wednesday 4 October
Attack points in browsers still abused by banking trojans
Peter Kalnai (ESET)
Michal Poslusny (ESET)
15:00 - 15:30   Wednesday 4 October
The sprawling market of consumer spyware
Joseph Cox (VICE Motherboard)
15:30 - 16:00   Wednesday 4 October
T   E   A   /   C   O   F   F   E   E
16:00 - 16:30   Wednesday 4 October
Hacktivism and website defacement: motivations, capabilities and potential threats
Marco Romagna (The Hague University of Applied Sciences)
Niek Jan van den Hout (The Hague University of Applied Sciences)
16:00 - 16:30   Wednesday 4 October
Offensive malware analysis: dissecting OSX/FruitFly via a custom C&C server
Patrick Wardle (Synack)
16:30 - 17:00   Wednesday 4 October
Crypton - exposing malware's deepest secrets
Julia Karpin (F5 Networks)
Anna Dorfman (F5 Networks)
16:30 - 17:00   Wednesday 4 October
XAgent: APT28 cyber espionage on macOS
Tiberius Axinte (Bitdefender)
17:00 - 17:30   Wednesday 4 October
Sponsor presentation - TBA
17:00 - 17:30   Wednesday 4 October
Sponsor presentation - TBA

Thursday 5 October, 2017

Red room

Green room

Small talks

08:00 - 09:00   Thursday 5 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
09:00 - 09:30   Thursday 5 October
The life story of an IPT - Inept Persistent Threat actor
Adam Haertle (UPC Poland)
09:00 - 09:30   Thursday 5 October
Last-minute paper - TBA
09:30 - 10:00   Thursday 5 October
Operation Orca - a cyber espionage diving in the ocean for at least six years
Chia-Ching Fang (Trend Micro)
Shih-Hao Weng (Trend Micro)
09:30 - 10:00   Thursday 5 October
Last-minute paper - TBA
10:00 - 10:30   Thursday 5 October
Linking Xpaj and Nymaim
Doina Cosovan (Security Scorecard)
Catalin Valeriu Lita (Security Scorecard)
10:00 - 10:30   Thursday 5 October
Last-minute paper - TBA
10:30 - 11:00   Thursday 5 October
T   E   A   /   C   O   F   F   E   E
11:00 - 11:30   Thursday 5 October
Last-minute paper - TBA
11:00 - 11:30   Thursday 5 October
Android reverse engineering tools: not the usual suspects
Axelle Apvrille (Fortinet)
11:30 - 12:00   Thursday 5 October
Last-minute paper - TBA
11:30 - 12:00   Thursday 5 October
Sophisticated router malware: more than just default passwords and silly scripts
Himanshu Anand (Symantec)
Chastine Menrige (Symantec)
12:00 - 12:30   Thursday 5 October
Last-minute paper - TBA
12:00 - 12:30   Thursday 5 October
Mariachis and jackpotting: ATM malware from Latin America
Thiago Marques (Kaspersky Lab)
Fabio Assolini (Kaspersky Lab)
12:30 - 14:00   Thursday 5 October
L   U   N   C   H
14:00 - 14:30   Thursday 5 October
Consequences of bad security in health care
Jelena Milosevic (Independent security researcher)
14:00 - 14:30   Thursday 5 October
Last-minute paper - TBA
14:30 - 15:00   Thursday 5 October
Minimum viable security: reaching a realistic SMB security maturity?
Claus Cramon Houmann (Peerlyst)
14:30 - 15:00   Thursday 5 October
Last-minute paper - TBA
15:00 - 15:30   Thursday 5 October
The state of cybersecurity in Africa: Kenya
Tyrus Kamau (Euclid Consultancy)
15:00 - 15:30   Thursday 5 October
Last-minute paper - TBA
15:30 - 16:00   Thursday 5 October
T   E   A   /   C   O   F   F   E   E
16:00 - 16:30   Thursday 5 October
Last-minute paper - TBA
16:00 - 16:30   Thursday 5 October
Exploring the virtual worlds of advergaming
Chris Boyd (Malwarebytes)
16:30 - 17:00   Thursday 5 October
Sponsor presentation - TBA
16:30 - 17:00   Thursday 5 October
Sponsor presentation - TBA

Friday 6 October, 2017

Red room

Green room

Small talks

08:30 - 09:30   Friday 6 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
09:30 - 10:00   Friday 6 October
VirusTotal tips, tricks, and myths
Randy Abrams (Independent security analyst)
09:30 - 10:00   Friday 6 October
The story of one geographically and industrially targeted zero-day
Denis Legezo (Kaspersky Lab)
10:00 - 10:30   Friday 6 October
Chkrootkit: eating APTs for breakfast since 1997
Nelson Murilo Rufino (Pangeia)
10:00 - 10:30   Friday 6 October
When worlds collide - the story of the Office exploit builders
Gabor Szappanos (Sophos)
10:30 - 11:00   Friday 6 October
T   E   A   /   C   O   F   F   E   E
11:00 - 11:30   Friday 6 October
Malware deobfuscation: symbolic analysis to the rescue!
Sébastien Bardin (CEA LIST)
Robin David (CEA LIST)
Jean-Yves Marion (LORIA)
11:00 - 11:30   Friday 6 October
Stuck between a ROC and a hard place
Holly Stewart (Microsoft)
11:30 - 12:00   Friday 6 October
Say hi to malware - using a deep learning method to understand malicious traffic
Zhaoyan Xu (Palo Alto Networks)
Tongbo Luo (Palo Alto Networks)
Wei Xu (Palo Alto Networks)
Kyle Sanders (Palo Alto Networks)
11:30 - 12:00   Friday 6 October
Knock, knock, knocking on PwC's door
Bart Parys (PwC)
12:00 - 12:30   Friday 6 October
Still a lot to learn: bypassing machine-learning AV solutions
Gilbert Sison (Trend Micro)
Brian Cayanan (Trend Micro)
12:00 - 12:30   Friday 6 October
From insider threat to insider asset: a practical guide
Kristin Leary (Forcepoint)
Richard Ford (Forcepoint)
12:30 - 14:00   Friday 6 October
L   U   N   C   H
14:00 - 14:30   Friday 6 October
Beyond lexical and PDNS: using signals on graphs to uncover online threats at scale
Dhia Mahjoub (Cisco Umbrella (OpenDNS))
David Rodriguez (Cisco Umbrella (OpenDNS))
14:00 - 14:30   Friday 6 October
TBA
Ryan MacFarlane (FBI)
14:30 - 15:00   Friday 6 October
TBA
Mick Moran (An Garda Síochána)
15:00 - 15:30   Friday 6 October
T   E   A   /   C   O   F   F   E   E
15:30 - 16:10   Friday 6 October
Keynote address
Brian Honan (BH Consulting)

(takes place in the Green room)
16:10 - 16:30   Friday 6 October
Conference closing session

(takes place in the Green room)

Reserve papers

Register

Registration for VB2017 is now open! Early bird rates apply until 30 June 2017.

Click here to go to the registration site, or visit the VB2017 page for more information about the conference.

VB2017 is sponsored by the following organizations:

 

Platinum sponsors:

ESET Tencent    

 

Gold sponsors:

PC Matic      

 

Silver sponsors:

OPSWAT 360 Security Symantec.jpg   

 

Sponsor of the VB2017 delegate Internet service:

Secudit

 

VB2017 is supported by:

SE Labs