Poster sessions

New for this year, VB plans to run "poster sessions" in parallel with the main conference stream. Posters will be hung in the conference foyer area, and at the end of each conference day there will be a one-hour poster presentation session, during which authors will present their posters.

Details of this year's posters

Below are some details of the VB2022 posters. Meet the presenters to find out more in the poster sessions at the end of each day at VB2022.

axelle-thumb.jpg

Androscope

Axelle Apvrille, Fortinet

Need to find an Android malware using a native library? intercept SMS? You’ve analysed one recently... but what’s its hash? Arg! Can’t find it! Where is it?! Tired of searching? Androscope is your friend!


JasonZhang-thumb.jpg

The State of OSINT

Jason Zhang, Anomali

Open source threat intelligence (OSINT) has grown significantly in recent years and become increasingly important in better understanding the cyber threat landscape. Security professionals often use OSINT to help identify network weaknesses and strengthen security solutions. There also exist big challenges with OSINT, such as information overload, uncertainty management and data quality. In this poster, we provide our study to reflect the current state of OSINT and aim to help alleviate the challenges in dealing with OSINT. More specifically, we focus our analysis on the following aspects: intelligence sources, intelligence collected by Anomali, top 10 malware attribution, and analysis of false positives.


OlegBil-thumb.jpg

UEFI trojan

Oleg Bil, State Technical Service

Details of a trojan found infecting UEFI firmware in Kazakhstan.                                                              

ArnieB-thumb.jpg

Latest methods in real-time threat intelligence

Arnie Bjorklund, SURBL

How are URL shorteners used to bypass email security solutions and what can we do about them?              

KennethBechtel-thumb.jpg

A new business model for the Internet

Kenneth Bechtel, Massive Computing

Software monetization is currently dominated by adware, as we are aware this is inherently insecure and provides multiple inequities of payment to the vendors, inconveniences to end users, and lack of control of what content is delivered.

A newer model, that leverages the vision of SETI online, creating a Distributing Computing Opt-In model exits and is more secure and less intrusive.  We will discuss this model and how it can be leveraged in a secure, reliable manner for multiple uses including but not limited to universities, medical facilities and even in an environmentally and trustworthy manner of legal coin mining.


 

What is a poster session?

A poster session is a room in which multiple presenters stand next to posters that outline their topic in brief. Delegates wander around the room reading the posters and stopping to talk to the presenters when they have questions or want more information - each presenter being ready to elaborate on their poster with a brief (less than 5 minutes) explanation.

For presenters, a poster presentation is a great way to communicate your research in a very concise format and build connections.

For delegates, poster sessions are a great way to find out about new projects, topics, research, and meet with researchers in a quick and efficient way – making new contacts along the way.

posters-1.jpgSource: Scientifica

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.