InfoconDB
Toggle navigation
Support
About
InfoconDB
Virus Bulletin
VB2016
VB2016
VB2016
took place Oct. 5, 2016 through Oct. 7, 2016 (8 years, 1 month ago) in Denver, Colorado, USA.
https://www.virusbulletin.com/conference/vb2016/
https://infocon.org/cons/Virus Bulletin/VB 2016 Denver/
Presentations
Wednesday, Oct. 5, 2016
10:30 -
Opening address
10:50 -
Opening Keynote
11:30 -
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
11:30 -
Security Challenges in Healthcare
11:30 -
Wild Android Collusions
12:00 -
Beware! Zombies are Coming
12:00 -
APT Reports and OPSEC Evolution, or: These Are Not the APT Reports You Are Looking For
14:00 -
Automating Visibility into User Behaviour Vulnerabilities to Malware Attack
14:00 -
"$ echo Internet $>_...": Towards Practical Internet-wide Probing and Crawling
14:00 -
Android Security
14:30 -
Detecting Man in the Middle Attacks With Canary Requests
14:30 -
Are They Real? Real-Life Comparative Tests of Anti-Virus Products
15:00 -
Breach Detection, Protection and Response Testing: The Next-Gen Approach
15:00 -
Professional Phishers and Their Habits
16:00 -
One-Click Fileless Infection
16:00 -
IEEE Anti-Malware Support Service
16:00 -
Diving into Malware's Furtive Plumbing
16:30 -
Trusted Code Execution on Untrusted Platform Using Intel SGX
16:30 -
Great Crypto Failures
17:00 -
Trusted code signing abuse by malware and their exploitation of the CA verification process (sponsor presentation)
17:00 -
Attack Psychology - Using Behaviour to Identify Threats (sponsor presentation)
Thursday, Oct. 6, 2016
09:00 -
Building a Local PassiveDNS Capability for Malware Incident Response
09:00 -
Last-minute paper: Malicious Proxy auto-configs: An Easy Way to Harvest Banking Credentials
09:00 -
The Chinese Underground Economy: the Hook007 Group
09:30 -
Open Source Malware Lab
09:30 -
Last-minute paper: BGP - From Route Hijacking to RPKI: How Vulnerable is the Internet?
10:00 -
Last-minute paper: Nymaim: the Untold Story
10:00 -
Debugging and Monitoring Malware Network Activities with Haka
11:00 -
Inside Exploit Kits
11:00 -
Anti-malware Testing Undercover
11:00 -
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in your Virtualized Environment
11:30 -
(In-) Security of Smartphone AntiVirus and Security Apps
11:30 -
Last-minute paper: On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
12:00 -
APT discussion
14:00 -
The Tor Project
14:00 -
Neverquest: Crime as a Service and On the Hunt for the Big Bucks
14:00 -
Last-minute paper: Challenges and Approaches of Cracking Ransomware
14:30 -
Last-minute paper: Getting Duped: Piggybacking on Webcam Streams for Surreptitious Recordings
14:30 -
Modern Attacks on Russian Financial Institutions
15:00 -
Last-minute paper: A Malicious OS X Cocktail Served from a Tainted Bottle
15:00 -
Unveiling the Attack Chain of Russian-Speaking Cybercriminals
16:00 -
Last-minute paper: The Beginning of the End(point): Where we are now and where we'll be in five years
16:00 -
Mind This Gap: Criminal Hacking and the Global Cybersecurity Skills Shortage, a Critical Analysis
16:30 -
SBDH Espionage Toolkit (sponsor presentation)
Friday, Oct. 7, 2016
09:30 -
Smart Outlets. Why We Need Responsible Disclosure!
09:30 -
Locky Strike: Smoking the Locky Ransomware Code
10:00 -
Mobile Applications: a Backdoor into Internet of Things?
10:00 -
Real-Time Static Analysis: Detecting Zero-Day Ransomware Campaigns
11:00 -
Using Machine Learning to Stop Exploit Kits In-Line in Real-Time
11:00 -
The Clean Software Alliance: the Enforcement Perspective
11:00 -
All Your Creds Are Belong To Us
11:30 -
Diving into Pinkslipbot's Latest Campaign
11:30 -
Uncovering The Secrets Of Malvertising
12:00 -
The Good, The bad & The Ugly: The Advertiser, the Bot & the Traffic Broker
12:00 -
The Elknot DDoS Botnets We Watched
14:00 -
Operation Sentry Stopper: A Long-Standing Cyber Espionage
14:00 -
Exploit Millions of Pebble Smartwatches for Fun and Profit
14:30 -
BlackEnergy - What We Really Know About the Notorious Cyber Attacks
14:30 -
Automatic Classifying of Mac OS X Samples
14:30 -
GPS Attacks on a 'Shoe String': Methods of Analysis and Countermeasures
15:30 -
Closing Keynote
16:10 -
Closing address
Presenters
Adam Agensky
Adrian Sanabria
Aliaksandr Chailytko
Amirali Sanatinia
Anthony Arrott
Antoine Lemay
Anton Cherepanov
Axelle Apvrille
Bart Parys
Ben Herzog
Benoît Ancel
Brandon Niemczyk
Brian Bartholomew
Brian Wallace
Chastine Menrige
Chris Boyd
Christine Whalley
Ciprian Oprisa
Claire Ma
Cong Zheng
Costin Raiu
Cristian Dantus
David Goulet
Dennis Batchelder
Dragos Gavrilut
Duc Nguyen
Erdem Aktas
Eszter Oroszi
Fanny Lalonde Lévesque
Ferenc Leitold
Floser Bacurio
Gadi Evron
Geoff McDonald
George Cabau
Glaucia Young
Guilherme Venere
Haoping Liu
Himanshu Anand
Hui Wang
Igor Muttik
Inbar Raz
Jan Sirmer
Jaromir Horejsi
Jarosław Jedynak
Jason Woloz
Jean-Ian Boutin
Joan Calvet
John Alexander
John Bambenek
Jonathan Andersson
Jorge Blasco
Jose M. Fernandez
Josiah Hagen
José Fernandez
Juan Andrés Guerrero-Saade
Jun Wang
Jérôme Segura
Kathy Wang
Kurt Baumgartner
Kyle Sanders
Kálmán Hadarics
Lenart Bermejo
Lenx Wei
Lindsey Lack
Luis Corrons
Maciej Kotowicz
Marius Tibeica
Mark Kennedy
Mark Olea
Martijn Grooten
Martin Jirkal
Matthieu Faou
Mehdi Talbi
Mike Benjamin
Mingyen Hsieh
Morgan Marquis-Boire
Oleg Petrovsky
Omer Yair
Or Safran
Patrick Wardle
Peter Kruse
Peter Kálnai
Peter Stancik
Pierre-Marc Bureau
Pin Wu
Prof. Guevara Noubir
Rachit Mathur
Radu Basaraba
Razor Huang
Righard Zwienenberg
Robert Lipovsky
Robert Simmons
Roland Dela Paz
Rommel Joven
Ryan Naraine
Sanchit Karve
Santiago Martin Pontiroli
Sebastian Porst
Siegfried Rasthofer
Simon Edwards
Spencer Hsieh
Stanislav Skuratovich
Stephan Huber
Stephen Cobb
Steve Brant
Sun Huang
Thomas Tian
Tomas Gardon
Tongbo Luo
Wayne Huang
Wei Xu
Ya Liu
Yaniv Balmas
Yucheng Zhou
Yulong Zhang
Zhaoyan Xu
Zhi Xu
hasherezade