Botconf 2016 Programme
List of accepted talks and workshops
Workshops (29/11)
You shall receive workshop registration information once you have purchased your main ticket, please proceed to REGISTRATION.
Please bring your laptops to participate in the workshops.
- ROOM 1 – 10h30 – 12h30 FastIR Collector, Sébastien Larinier
- ROOM 1 – 14h00 – 17h30 Cracking Banking Fraud, Magal Baz
, Pavel Asinovsky
- ROOM 2 – 14h00 – 17h30 MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration, Alexandre Dulaunoy
- ROOM 3 – 14h00 – 17h30 Getting Your Hands Dirty: How to Analyze the Behavior of Malware Traffic and Web Connections, Sebastián García
, Veronica Valeros
All attendees to the workshops will be provided with coffee breaks and lunch.
Main programme (30/11-02/12) (alphabetic order of author)
The main scientific programme will be composed of 25 to 30 talks (short talks, regular presentations, presentations with published papers). We will also have a lightning talk session.
During the three days, attendees will be provided with coffee breaks, lunches, a welcome cocktail and a reception dinner at a selected location in Lyon.
Schedule
- Day 1 (Wednesday 30/11)
- Welcome (badges, coffee…) : 09:30
- 11:00 Introduction speech/Opening
- 18:30 Cocktail
- Day 2 (Thursday 01/12)
- Doors open at 08:30
- 09:00 First talk of the day
- 19:30 Reception in Lyon
- Day 3 (Friday 02/12)
- Doors open at 09:00
- 09:30 First talk of the day
- 16:00 Closing speeh
- 16:30 End
Invited speakers
- Ransomware, Christiaan Beek
- Challenges for a cross-jurisdictional botnet takedown, Margarita Louca
- Jean-Michel Picod
Selected talks and papers
- Preventing File-Based Botnet Persistence and Growth, Kurtis Armour
- Tracking Exploit Kits, John Bambenek
- Analysis of Free Movies and Series Websites Guided by Users Search Terms, Luis Alberto Benthin Sanguino
, Martin Clauß
- Vawtrak Banking Trojan : A Threat to the Banking Ecosystem, Raashid Bhat
, Victor Acin
- Visiting the Bear Den, Jessy Campos
, Thomas Dupuy
, Joan Calvet
- Snoring Is Optional: The Metrics and Economics of Cyber Insurance for Malware Related Claims, Wayne Crowder
- Language Agnostic Botnet Detection Based on ESOM and DNS, Christian Dietz
, Rocco Mandrysch
, Urs Anliker
, Gabi Dreo
- Rough Diamonds in Banking Botnets, Jose Miguel Esparza
, Frank Ruiz
- A Tete-a-Tete with RSA Bots, Jens Frieß
, Laura Guevara
- Detecting the Behavioral Relationships of Malware Connections, Sebastián García
- ISFB, Still Live and Kicking, Maciej Kotowicz
- LURK – The Story about Five Years of Activity, Vladimir Kropotov
, Fyodor Yarochkin
- Browser-based Malware: Evolution and Prevention, Andrey Kovalev
, Evgeny Sidorov
- Improve DDoS Botnet Tracking With Honeypots, Ya Liu
- Dridex Gone Phishing, Gal Meiri
, Magal Baz
- Nymaim Origins, Revival and Reversing Tales, Alberto Ortega
- Attacking Linux/Moose 2.0 Unraveled an EGO MARKET, Masarah Paquet-Clouston
, Olivier Bilodeau
- Hunting Droids from the Inside, Łukasz Siewierski
- How Does Dridex Find Friends?, Alexandra Toussaint
, Paul Rascagnères
, Sébastien Larinier
- Takedown client-server botnets the ISP-way, Quảng Trần Minh
- Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk), Tom Ueltschi
- Function Identification and Recovery Signature Tool, Angel Villegas