InfoconDB
Toggle navigation
About
InfoconDB
Virus Bulletin
VB2018
VB2018
VB2018
took place Oct. 3, 2018 through Oct. 5, 2018 (4 years, 4 months ago) in Montreal, Canada.
https://www.virusbulletin.com/conference/vb2018/
Presentations
Wednesday, Oct. 3, 2018
10:30 -
VB2018 opening address
10:50 -
Keynote address: Customers, suppliers, and the adversaries that come with them
11:30 -
Exploiting ActionScript3 interpreter
11:30 -
From Hacking Team to hacked team to…?
12:00 -
Foreverdays: tracking and mitigating threats targeting civil society orgs
12:00 -
Analysing compiled binaries using logic
14:00 -
Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors
14:00 -
Unpacking the packed unpacker: reversing an Android anti-analysis library
14:00 -
The botnet landscape - live threats and steps for mitigation
14:30 -
The missing link in the chain? Android network analysis
14:30 -
Now you see it, now you don't: wipers in the wild
15:00 -
The role of malware in intelligence operations (partner presentation)
15:00 -
Who wasn't responsible for Olympic Destroyer?
16:00 -
Fire & ice: making and breaking macOS firewalls
16:00 -
DOKKAEBI: Documents of Korean and Evil Binary
16:00 -
Workshop: Manual kernel mode malware analysis
16:30 -
Lazarus Group: one mahjong game played with different sets of tiles
16:30 -
Code signing flaw in macOS
17:00 -
Since the hacking of Sony Pictures
17:00 -
Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived
Thursday, Oct. 4, 2018
09:00 -
Tricky sample? Hack it easy! Applying dynamic binary instrumentation to lightweight malware behaviour analysis
09:00 -
ARS VBS Loader: ‘cause size doesn't matter (right?)
09:30 -
VBA + AMSI: evening the score with macro malware
09:30 -
The wolf in sheep's clothing - undressed
10:00 -
PUPs: a tale about consumers, money and data (partner presentation)
10:00 -
Behind the scenes of the SamSam investigation
11:00 -
Nomadic Octopus: cyber espionage in Central Asia
11:00 -
Android app deobfuscation using static-dynamic cooperation
11:00 -
An industry approach for unwanted software criteria and clean requirements
11:30 -
Windows Defender under the microscope: a reverse engineer's perspective
11:30 -
The Big Bang Theory by APT-C-23
12:00 -
An international 'who-cares-ometer' for cybercrime (partner presentation)
12:00 -
Shedding skin - Turla's fresh faces
14:00 -
Uncovering the wholesale industry of social media fraud: from botnet to bulk reseller panels
14:00 -
Workshop: Android malware reverse engineering for the brave
14:00 -
The Hitchhiker's Guide to the North Korean malware galaxy
14:30 -
Botception: hire a botnet to spread one's own botnet
14:30 -
Explain Ethereum smart contract hacking like I am five
15:00 -
Anatomy of an attack: detecting and defeating CRASHOVERRIDE
15:00 -
DNS tunnelling: that's not your grandma's exfil
16:00 -
Internet balkanization: why are we raising borders online?
16:00 -
Triada: the past, the present and the (hopefully not existing) future
16:30 -
Where have all the good hires gone?
16:30 -
Little Brother is watching - we know all your secrets!
Friday, Oct. 5, 2018
09:15 -
Welcome & opening remarks
09:30 -
Threat intelligence data - a global market update
09:30 -
Tracking Mirai variants
09:30 -
Cost of pwnership: how black market tools and services facilitate the operation of cybercriminal enterprises
10:00 -
Artificial intelligence to assist with ransomware cryptanalysis
10:00 -
Hide'n'Seek: an adaptive peer-to-peer IoT botnet
10:15 -
Luminous data - observing malicious domains at scale
11:00 -
Workshop: AI in cybersecurity
11:00 -
The modality of mortality in domain names
11:00 -
Correlating threat data - orchestration & next generation takedowns
11:00 -
Starving malware authors through dynamic classification
11:30 -
Lightning talks - innovation in threat intel
11:30 -
U2Fishing: potential security threat introduced by U2F key wrapping mechanism
11:30 -
Office bugs on the rise
12:00 -
From drive-by download to drive-by mining: understanding the new paradigm
12:00 -
Prisoner's dilemma: threat intelligence sharing between competitors
12:00 -
Dangerous comeback: fighting ever-changing macro threats (VB2018 partner presentation)
13:30 -
Threat intelligence brokerage revisited
14:00 -
Panel discussion: Will WHOIS go dark? Threat intelligence in the post GDPR era.
14:00 -
Inside Formbook infostealer
14:00 -
Levelling up: why sharing threat intelligence makes you more competitive
14:00 -
Under the hood - the automotive challenge
14:30 -
Fake News, Inc.
14:30 -
Security issues of IoV devices
15:30 -
Keynote address: Denial of trust: the new attacks
16:10 -
Conference closing session
Presenters
Adam Meyers
Adolf Středa
Adrian Șendroiu
Aleksejs Kuprins
Alexander Adamov
Alexander Vukcevic
Alexei Bulazel
Amit Serper
Andrew Brandt
Anton Cherepanov
Anton Ivanov
Aseel Kayal
Axelle Apvrille
Benoît Ancel
Benoît Hamelin
Boris Larin
Brad Antoniewicz
Daniel Assouline
Filip Kafka
Gabor Szappanos
Gabriela Nicolao
Giulia Biagini
Hui Wang
Inbar Raz
Itai Tevet
Jaeki Kim
Jan Sirmer
Jay Rosenberg
Jérôme Segura
Jiri Sejtko
Joe Blackbird
Joe Slowik
John Lambert
John Scott-Railton
Jose Miguel Esparza
Juan Andrés Guerrero-Saade
Karishma Sanghvi
Kenneth Geers
Kurt Baumgartner
Kyoung-ju Kwak
Lei Bi
Lotem Finkelstein
Loucif Kharouni
Łukasz Siewierski
Lysa Myers
Maddie Stone
Maksim Shudrak
Mark Kendrick
Martijn Grooten
Masarah Paquet-Clouston
Masashi Nishihata
Matthias Leisi
Michael Daniel
Michael Osterman
Michal Poslušný
Mike Scott
Min-Chang Jang
Minseok
Norm Ritchie
Patrick Wardle
Paul Rascagnères
Paul Vixie
Peter Kálnai
Peter Mackenzie
Rowland Yu
Saher Naumaan
Sayeed Abu-Nimeh
Siegfried Rasthofer
Simon Forster
Spencer Hsieh
Stefan Tanase
Stephan Huber
Stephen Cobb
Steven Arzt
Thais Moreira Hamasaki
Thomas Reed
Tobias Knecht
Tom Bartel
Vanja Svajcer
Vladimir Diaconescu
Wang Kang
Warren Mercer
Wendy Nather
Xiaolong Guo
Ya Liu
Yaniv Mordekhay
Yoni Moses
Zoltán Balázs