The presentations from last month’s Virus Bulletin conference in Ottawa is now online.
Keynote address
- The AV industry: quo vadis? by Alex Eckelberry
Corporate stream
- The malware business by David Emm
- Stormy weather: a quantitative assessment of the Storm web threat in 2007 by Anthony Arrott
- Intentions of capitalistic malware by Gunter Ollmann and Holly Stewart
- Affiliate web-based malware by Paul Baccas
- Life beyond outbreaks. Marketing in today’s threat environment by Jeff Aboud
- How secure is your virtualised network? by Gunter Ollmann (on behalf of Joshua Corman)
- Network Access Control technologies by Benjamin Czarny
- Effective open-source spam filtering for enterprise by Chris Lewis
- Playing with shadows – exposing the black market for online game password theft by Chun Feng
- A look at defence in depth: the re-evaluation by Kenneth Bechtel
Technical stream
- Towards integrated malware defence by Morton Swimmer
- Your computer is now stoned (…again!). The rise of the MBR rootkit by Kimmo Kasslin
- When the hammer falls – effects of successful widespread disinfection on malware development and direction by Matt McCormack
- Applying user-mode memory scanning on Windows NT by Eric Kumar
- A fast randomness test that preserves local detail by Tim Ebringer and Li Sun
- Graphs, entropy and grid computing: automatic comparison of malware by Ismael Briones
- The robustness of new email identification standards by Patrik Ostrihon and Reza Rajabiun
- Coordinated distributions method for tracking botnets sending out spam by Andrey Bakhmutov
- Malware forensics: detecting the unknown by Martin Overton
- Using game theory to assess the strength of an AV system against evolving offences by Andrew Walenstein and Arun Lakhotia
- Rebuilding anti-malware testing for the future by Igor Muttik
- Samples.malware.org: sample sharing for the next decade by Richard Ford and William Allen
- Clean data profiling by Bartlomiej Uscilowski and Julie Weber
‘Last-minute’ technical papers
- Race to zero with online scanners by Boris Lau
- Apple iPhone SDK programming by Marius van Oers
- Recent rogueware by Kurt Baumgartner
- URL check: Malware and phishing URLs aggregator by Sorin Mustaca
Discussion forum
Leave A Comment