Schedule – Botconf 2020

Please find below the list of selected talks for Botconf 2020. The sessions will take place from Tuesday 1st December 2020 to Friday 4th December 2020 between 13:00 and 16:00 Paris time (UTC+1).

Registration is mandatory to attend the online webinar, please follow this link.

Tuesday December 1st 2020 (UTC+1, Paris Time)

  • 13:00 – Opening
  • 13:10 – Tracking Unsafe Services that are Hosted by Bots using IP Reputation; Asaf Nadler and Jordan Garzon
  • 13:30 – Fluxxy Dissection; Matthieu Kaczmarek
  • 14:00 – Inline Detection of Copy-Paste Botnet C&C; Jordan Garzon and Asaf Nadler
  • 14:30 – An overview of the Botnet Simulation Framework; Leon Böck, Shankar Karuppayah, Max Mühlhäuser and Emmanouil Vasilomanolakis
  • 15:00 – Your *aaS is on fire, or how threat actors (ab)use cloud providers; Maciej Kotowicz
  • 15:30 – Global threat hunting: how to predict attacks at preparation stage; Rustam Mirkasymov

Wednesday December 2nd 2020 (UTC+1, Paris Time)

  • 13:00 – Hunting MageCart Skimmers; Max ‘Libra’ Kersten
  • 13:20 – Hunting the Quasar Family – How to Hunt Malware Family; Shusei Tomonaga and Kota Kino
  • 13:50 – Fritzfrog: A Story of a Unique P2P Botnet; Ophir Harpaz
  • 14:20 – The fall of Domino – a preinstalled hostile downloader; Łukasz Siewierski
  • 14:50 – Turla operations from a front row seat; Matthieu Faou

Thursday December 3rd 2020 (UTC+1, Paris Time)

  • 13:00 – A detailed look into the Mozi P2P IoT botnet; Andreas Klopsc, Chris Dietrich and Raphael Springer
  • 13:20 – A Proposed Civil Liability Framework for Disrupting Botnets, with a particular focus on Smart Devices; Iain Nash
  • 13:50 – The Winnti Group: an analysis of their latest activities; Mathieu Tartare
  • 14:20 – APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications; Masarah Paquet-Clouston, Vit Sembera, María José Erquiaga and Sebastian García
  • 14:50 – xOSSig : Leveraging OS Diversity to Automatically Extract Malware Code Signatures; Michael Brengel and Christian Rossow

Friday December 4th 2020 (UTC+1, Paris Time)

  • 13:00 – The black industry’s recourse to money under the COVID-19; Guangyuan Zhao and Tiejun Wu
  • 13:30 – NanoCore hunter: tracking NanoCore servers and watching behavior of RAT operators for 180 days; Takashi Matsumoto, Yu Tsuda, Nobuyuki Kanaya, Masaki Kubo and Daisuke Inoue
  • 14:00 – It Hurt Itself in Confusion: No distribute scanners and stealthy malwareLiv Rowley and Mathieu Gaucheler
  • 14:20 – Building and maintaining a honeypot for medical devices; Axelle Apvrille
  • 14:50 – Honeypot + graph learning + reasoning = scale up your emerging threat analysis; Ali Fakeri Tabrizi, Hongliang Liu, Anastasi Polyakova and Yohai Einav
Print Friendly, PDF & Email