Botconf 2014 Documents and videos
Prez | Paper | Video | |
Wednesday December 3 2014 |
|||
1.1 – Welcome address Eric Freyssinet |
|||
1.2 – Keynote – United Kingdom’s National crime agency on botnet takedowns Stewart Garrick, Benedict Addis |
![]() |
||
1.3 – Semantic Exploration of Binaries Laura Guevara, Daniel Plohmann |
![]() |
![]() |
|
1.4 – Havex RAT, the Full Story Giovanni Rattaro, Paul Rascagnères, Renaud Leroy |
|||
1.5 – The Many Faces of Mevade Martijn Grooten, João Gouveia |
![]() |
![]() |
|
1.6 – Splicing and Dicing 2014: Examining this Year’s Botnet Attack Trends Nick Sullivan |
![]() |
||
1.7 – Virus Tracker Peter Kleissner |
![]() |
![]() |
|
1.8 – How to Dismantle a Botnet: the Legal Behind the Scenes Karine e Silva |
![]() |
![]() |
|
1.9 – Round table debate Karine e Silva, Renaud Leroy |
|||
Lightning talks (3′ slots…) | |||
Joan Calvet | |||
Thomas Chopitea | |||
Holly Stewart | |||
Daniel Plohmann | |||
Martijn Grooten – Qakbot | ![]() |
||
Vincent Hinderer | |||
Nicholas Summerlin | |||
Geoffroy Couprie | |||
Thursday December 4 2014 |
|||
2.1 – Workshop – Feedback on Windbg Usage Paul Rascagnères |
![]() |
![]() |
|
2.2 – A Timeline of Mobile Botnets Ruchna Nigam |
![]() |
![]() |
|
2.3 – Ad Fraud Botnets 101 Oleksandr Tsvyashchenko, Sebastian Millius and Douglas de Jager |
|||
2.4 – CONDENSER: A Graph-Based Approach for Detecting Botnets Pedro Camelo, João Moura and Ludwig Krippahl |
![]() |
![]() |
![]() |
2.5 – APT Investigation Backstage Ivan Fontarensky, Fabien Périgaud, Ronan Mouchoux, Cédric Pernet and David Bizeul |
|||
2.6 – Middle Income Malware Actors in Poland: VBKlip and Beyond Łukasz Siewierski |
![]() |
||
2.7 – Bypassing Sandboxes for Fun Paul Jung |
![]() |
![]() |
|
2.8 – Learning Attribution Techniques by Researching a Bitcoin Stealing Cyber Criminal Mark Arena |
|||
2.9 – The Russian DDoS One: Booters to Botnets Dennis Schwarz |
![]() |
![]() |
|
2.10 – Chinese Chicken: Multiplatform DDoS Botnets Peter Kálnai and Jaromír Hořejší |
![]() |
![]() |
|
2.11 – Ponmocup Hunter 2.0 — The Sequel Tom Ueltschi |
![]() |
![]() |
|
Lightning talks (3′ slots…) | |||
Łukasz Siewierski – Somehow Unusual Android Malware Sample | ![]() |
||
Peter Wälti | |||
Stewart Garrick | |||
Nick Sullivan | |||
Maxime Morin – Radare2 | ![]() |
||
Pierre-Edouard Fabre | |||
Friday December 5 2014 |
|||
3.1 – A New Look at Fast Flux Proxy Networks Hendrik Adrian and Dhia Mahjoub |
![]() |
![]() |
|
3.2 – Botnets of *NIX Web Servers Evgeny Sidorov, Konstantin Otrashkevich, Andrey Kovalev and Asya Posadskaya |
|||
3.3 – DNS Analytics, Case Study Osama Kamal |
![]() |
![]() |
|
3.4 – Keynote – A tour in the Analysis of X86 Botnets@loria.fr Jean-Yves Marion |
![]() |
||
3.5 – Finding Holes in Banking 2FA: Operation Emmental David Sancho Blog about this paper and white paper |
![]() |
||
3.6 – ZeuS Meets VM – Story so Far Maciej Kotowicz |
![]() |
||
3.7 – Farewell Eric Freyssinet |