Botconf 2013

Disass

Disass Botconf 2013 Thursday | 17:30 – 17:50 Ivan Fontarensky 🗣 Disass is a binary analysis framework written in Python to automate static malware reverse engineering. Currently Disass is not designed to handle packed binary as static unpacking is a pretty tough task on its own. The approach is simple : it’s stupid to repeat […]

Disass Read More »

Efficient Program Exploration by Input Fuzzing

Efficient Program Exploration by Input Fuzzing Botconf 2013 Thursday | 17:50 – 18:10 Thanh Dinh Ta 🗣 | Jean-Yves Marion 🗣 | Guillaume Bonfante 🗣 One of the issues of a malware detection service is to update its database. For that, an analysis of new samples must be performed. Usually, one tries to replay the behavior of malware in

Efficient Program Exploration by Input Fuzzing Read More »

The power of a team work – Management of Dissecting a Fast Flux Botnet, OP-Kelihos “Unleashed”

The power of a team work – Management of Dissecting a Fast Flux Botnet, OP-Kelihos “Unleashed” Botconf 2013 Thursday | 18:10 – 18:30 Hendrik Adrian 🗣 | Dhia Mahjoub 🗣 “Facing a come-back Fast Flux (HLUX) botnet like Kelihos (Khelios) which was previously announced to be shutdown by big entities is not an easy task that can

The power of a team work – Management of Dissecting a Fast Flux Botnet, OP-Kelihos “Unleashed” Read More »

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment Botconf 2013 Friday | 09:00 – 09:30 Julien Lavesque 🗣 | Hervé Luga | Meriam Mahjoub | Sébastien Aucouturier | Christophe Bisière | Jean-Nicolas Piotrowski Edit PDF Video

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment Read More »

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Botconf 2013 Friday | 09:30 – 10:00 Pasquale Stirparo 🗣 | Laurent Beslay 🗣 Due to the substantially different ecosystem we have to deal with when it comes to mobile security, it makes it harder to detect and react to malware attacks if using conventional techniques.

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Read More »

Reputation-based Life-course Trajectories of Illicit Forum Members

Reputation-based Life-course Trajectories of Illicit Forum Members Botconf 2013 Friday | 11:20 – 11:50 David Décary-Hétu 🗣 The Internet has become over the past fifteen years the medium of choice for people to communicate with each other. As Boase & Wellman (2002) have predicted, we are now firmly in the era of networked individualism where

Reputation-based Life-course Trajectories of Illicit Forum Members Read More »

Using cyber intelligence to detect and localize botnets

Using cyber intelligence to detect and localize botnets Botconf 2013 Thursday | 13:40 – 14:00 Enrico Branca 🗣 Our purpose is to present a cyber intelligence system created to analyze network communications in order to detect and identify botnet activities and distribution of malware related to botnets, both over the internet and within targeted networks.

Using cyber intelligence to detect and localize botnets Read More »

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets Botconf 2013 Thursday | 09:40 – 10:10 Ulrich Seldeslachts 🗣 Edit PDF Video

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets Read More »

Scroll to Top