InfoconDB
Toggle navigation
Support
About
InfoconDB
Virus Bulletin
VB2017
VB2017
VB2017
took place Oct. 4, 2017 through Oct. 6, 2017 (7 years ago) in Madrid, Spain.
https://www.virusbulletin.com/conference/vb2017/
https://infocon.org/cons/Virus Bulletin/VB 2017 Madrid/
Presentations
Wednesday, Oct. 4, 2017
10:30 -
VB2017 opening address
10:50 -
Keynote address: Inside Cloudbleed
11:30 -
Have you scanned your BIOS recently?
11:30 -
EICAR trustworthiness strategy and minimum standard
11:30 -
BPH exposed - RBN never left they just adapted and evolved. Did you?
12:00 -
Getting under the skin: an in-depth look at MSIL malware obfuscation techniques and strategies for deobfuscation
12:00 -
Walking in your enemy's shadow: when fourth-party collection becomes attribution hell
14:00 -
Nine circles of Cerber
14:00 -
Modern reconnaissance phase on APT - protection layer
14:00 -
Calling all PUA fighters!
14:30 -
Dridex v4 - AtomBombing and other surprises
14:30 -
Digital security and human rights: tales and trends from the frontline
15:00 -
The sprawling market of consumer spyware
15:00 -
Browser attack points still abused by banking trojans
16:00 -
WHOIS in peril?
16:00 -
Hacktivism and website defacement: motivations, capabilities and potential threats
16:00 -
Offensive malware analysis: dissecting OSX/FruitFly via a custom C&C server
16:30 -
Crypton - exposing malware's deepest secrets
16:30 -
XAgent: APT28 cyber espionage on macOS
17:00 -
A visit to the dark side (sponsor presentation)
Thursday, Oct. 5, 2017
09:00 -
The CCleaner security incident
09:00 -
The life story of an IPT - Inept Persistent Threat actor
09:00 -
Last-minute paper: Publishing our malware stats
09:30 -
Operation Orca - a cyber espionage diving in the ocean for at least six years
09:30 -
Last-minute paper: Webview is far more than a 'view'
10:00 -
Last-minute paper: FinFisher: New techniques and infection vectors revealed
10:00 -
Linking Xpaj and Nymaim
11:00 -
Last-minute paper: Spora: the saga continues a.k.a. how to ruin your research in a week
11:00 -
The (testing) world turned upside down
11:00 -
Android reverse engineering tools: not the usual suspects
11:30 -
The router of all evil: more than just default passwords and silly scripts
11:30 -
Last-minute paper: The shell in the web
12:00 -
Last-minute paper: Turning Trickbot: decoding an encrypted command-and-control channel
12:00 -
Mariachis and jackpotting: ATM malware from Latin America
14:00 -
The encryption vs. inspection debate
14:00 -
Consequences of bad security in health care
14:00 -
Last-minute paper: Client Maximus raises the bar
14:30 -
Last-minute paper: Industroyer: biggest threat to industrial control systems since Stuxnet
14:30 -
Minimum viable security: reaching a realistic SMB security maturity?
15:00 -
Last-minute paper: Battlefield Ukraine: finding patterns behind summer cyber attacks
15:00 -
The state of cybersecurity in Africa: Kenya
16:00 -
Inside Netrepser - a JavaScript-based targeted attack
16:00 -
Exploring the virtual worlds of advergaming
16:30 -
Habo SecBox: run and monitor malware on real Android device (sponsor presentation)
Friday, Oct. 6, 2017
09:30 -
VirusTotal tips, tricks, and myths
09:30 -
The story of one geographically and industrially targeted zero-day
10:00 -
When worlds collide - the story of the Office exploit builders
10:00 -
Record and replay debugging against in-the-wild exploit kits and other practical cases
10:00 -
Chkrootkit: eating APTs for breakfast since 1997
11:00 -
Malware deobfuscation: symbolic analysis to the rescue!
11:00 -
Lessons learned from the WannaCry outbreak
11:00 -
Stuck between a ROC and a hard place
11:30 -
Say hi to malware - using a deep learning method to understand malicious traffic
11:30 -
Knock, knock, knocking on PwC's door
12:00 -
Still a lot to learn: bypassing machine-learning AV solutions
12:00 -
From insider threat to insider asset: a practical guide
14:00 -
Beyond lexical and PDNS: using signals on graphs to uncover online threats at scale
14:00 -
Peering into spam botnets
14:00 -
The rise and fall of Bayrob
14:30 -
Your role in child abuse
14:30 -
Malware on the Go
14:30 -
A new technique for detecting and blocking the installation of a malicious software based on the reputation of loadpoint n-grams
15:30 -
Keynote address: Failure is an option
16:10 -
Conference closing session
Presenters
Adam Haertlé
Aditya Kapoor
Adrian Schipor
Alexander Adamov
Alexandru Maximciuc
Anders Carlsson
Andrew Brandt /
Spike
Angel Villegas
Anna Dorfman
Anton Cherepanov
Axelle Apvrille
Bart Parys
Brian Cayanan
Brian Honan
Catalin Valeriu Lita
Chastine Menrige
Chia-Ching Fang
Chris Boyd
Claudio Guarnieri /
nex
Claus Cramon Houmann
Costin Raiu
Cristina Vatamanu
David Harley
David Rodriguez
Denis Legezo
Dennis Batchelder
Dhia Mahjoub
Doina Cosovan
Előd Kironský
Fabio Assolini
Filip Kafka
Gabor Szappanos
Gilbert Sison
Himanshu Anand
Holly Stewart
Jakub Křoustek
Jarkko Turkulainen
Jarno Niemelä
Jarosław Jedynak
Jason Passwaters
Jason Woloz
Jean-Yves Marion
Jelena Milosevic
Jiří Bracek
John Graham-Cumming
John Hawes
Joseph Cox
Juan Andrés Guerrero-Saade
Julia Karpin
Kaarthik Muthukrishnan
Kristin Leary
Kyle Sanders
Liam O Murchu
Maciej Kotowicz
Magal Baz
Marcel Eberling
Marco Romagna
Michal Poslušný
Mick Moran
Neil Schwartzman
Nelson Murilo Rufino
Nick Sullivan
Niek Jan van den Hout
Nitin Shekokar
Omer Agmon
Or Eshed
Patrick Wardle
Paul Rascagnères
Peter Kálnai
Prachi Jhanwar
Rainer Fahs
Randy Abrams
Razvan Gavrila
Richard Ford
Robert Lipovsky
Robin David
Rowland Yu
Ryan MacFarlane
Sachar Paulus
Shih-Hao Weng
Simon Roses Femerling
Song Lanqi
Stanislav Skuratovich
Sujit Magar
Sébastien Bardin
Thiago Marques
Tiberius Axinte
Tongbo Luo
Tony Anscombe
Tyrus Kamau
Wang Bin
Warren Mercer
Wei Xu
Xin Ouyang
Yaniv Balmas
Zhaoyan Xu