Final Programme
Keynotes
# | Title | Names | Files | Paper | Video |
---|---|---|---|---|---|
K01 | Successful Botnet Takedowns: The-good-cooperation part | Margarita Louca | ![]() |
||
K02 | Mobile botnet malware collection | Apostolos Malatras, Laurent Beslay | |||
K03 | Inside traffic exchange networks | Jean-Michel Picod, Elie Bursztein |
Presentations
Short talks
# | Title | Names | Files | Paper | Video |
---|---|---|---|---|---|
S01 | DGA clustering and analysis: mastering modern, evolving threats | Aliaksandr Chailytko, Aliaksandr Trafimchuk, Ron Davidson | ![]() |
![]() |
![]() |
S02 | Sandbox detection for the masses: leak, abuse, test | Zoltan Balazs | ![]() |
![]() |
![]() |
S03 | (Mostly) Polish threat landscape: not only VBKlip | Łukasz Siewierski | ![]() |
||
S04 | Make It count: An analysis of a brute-forcing botnet | Veronica Valeros | ![]() |
![]() |
![]() |
S05 | Building a better botnet DGA mousetrap: separating mice, rats and cheese in DNS data | Josiah Hagen, Miranda Mowbray, Prasad Rao | ![]() Prezi |
||
S06 | The dirty half-dozen of the Brazilian threat landscape | Tal Darsan |
Lightning talks
# | Title | Names | Files | Paper | Video |
---|---|---|---|---|---|
LT01 | Browser and Environment Hardening | Kurtis Armour | ![]() |
||
LT02 | Stegoloader | Chris Dietrich, Pierre-Marc Bureau | ![]() |
||
LT03 | Creating your own CTI | Tom Ueltschi | |||
LT04 | Storm in the DNS | Stéphane Bortzmeyer | |||
LT05 | The state of spam in 2015 | Martijn Grooten | ![]() |
||
LT06 | Python log parser – Flask Log Map | Hugo Rifflet | ![]() |
||
LT07 | Dynamic symbolic execution for malware reverse-engineering | Robin David | ![]() |
||
LT08 | Cymon.io – Open threat intelligence for fighting botnets | Roy Firestein | ![]() Cymon.io |
||
LT09 | Automatic MIME attachments triage | Xavier Mertens | ![]() |
||
LT10 | Wrestling elephants: Tackling malware research issues (The Name Game) | Wayne Crowder | ![]() |
||
LT11 | Nolimitsecu Podcast | Johanne Ulloa | ![]() Nolimitsecu |