Provisional schedule

PROVISIONAL SCHEDULE

Please find below our provisional schedule for Botconf 2024.

Overall schedule

The conference is organised with the following constraints:

  • Tuesday 23/04/2024
    • 12:00 Registration for workshops & Workshop lunch
    • 13:00 Beginning of the workshops
    • 18:00 End of the last workshops
  • Wednesday 24/04/2024
    • 10:00 Opening of the registration desk (only for ticket holders, no payment on site)
    • 11:00 Opening of the conference
    • ...
  • Until Friday 26/04/2024
    • 17:00 Closing of the conference

Talks

The following talks have been confirmed:

  • It's getting cloudy – peering into the recent APT29 activities - CERT Polska
  • 3CX: a "mise en abyme" supply chain attack? - Godefroy Galas and Victorien Fragne
  • Eastern Asian Android Assault – FluHorse. - Alexandr Shamshur and Raman Ladutska
  • I'm a Bad Noodle!: An Analysis of Noodle RAT Shared among China-nexus Groups - Hiroaki Hara
  • Parsing the Unparsable: Turning Analyzers into Victims - Yusuf Kocadas and Furkan Er
  • Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov
  • Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt
  • Everyone Gets a Webshell! Or, Backdooring Web Hosting Companies in Scale - Daniel Frank
  • LightSpy2: feature-rich mobile surveillance tool set - Victor Chebyshev
  • The Supershell and its widespread Botnet - Chetan Raghuprasad
  • IcedID's Icy Depths: A Year in Infrastructure and Trends - Rachelle Goddin and Josh Hopkins
  • Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez
  • Caviar Scammers: Uncovering the SturgeonPhisher APT Group - Damien Schaeffer
  • IoT Malware and Rookit Detections Using Electromagnetic Insights: Unveiling the Unseen - Duy-Phuc Pham, Damien Marion and Annelie Heuser
  • Unplugging PlugX: Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay
  • A Taxonomic Overview of Prevalent Malware Communication Strategies - Steffen Enders, Daniel Plohmann and Manuel Blatt
  • BYOVD Unveiled: Hunting and Exploring Vulnerabilities in Device Drivers - Nirmal Singh and Rajdeepsinh Dodia
  • Into the Vapor to Tracking Down Unknown Panda's Claw Marks - Suguru Ishimaru, Yusuke Niwa and Motohiko Sato
  • Evasive Panda touring in Asia: AitM opening act followed by a duet of MgBot and Nightdoor - Facundo Munoz and Anh Ho
  • GenRex Demonstration: Level Up Your Regex Game - Dominika Regéciová
  • Telegram-as-a-C2 or a Fourfold Tale of Bad OPSEC - Pol Thill
  • Pikabot's Sophisticated Evasion: We Catch Em All - Pim Trouerbach and Kelsey Merriman
  • Gozi ISFB - Memoirs of a banking trojan - Fred Harrison
  • New Modular Malware RatelS: Shades of PlugX - Yoshihiro Ishikawa and Takuma Matsumoto
  • Writing Configuration Extractors: Navigating the Challenges in Extracting Malware Artifacts. - Souhail Hammou and Miroslav Stampar
  • Teams is for C2: Building and Reversing a Teams RAT - Randy Pargman
  • Rhadamanthys: The new stealer making WAVs in the eCrime landscape - Bea Venzon
  • Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev and Arie Olshtein
  • Warp's Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium - Sathwik Ram Prakki and Rayapati Lakshmi Prasanna Sai
  • DotNet Malware Analysis - Max Kersten
  • Opera1er: from tracking the threat actor to detaining a criminal behind - Anton Ushakov and Hugo Rifflet

Workshops

The following three workshops have been confirmed (special registration will be required, to open soon on the ticketing website)

  • Writing Configuration Extractors: Navigating the Challenges in Extracting Malware Artifacts. - Souhail Hammou and Miroslav Stampar
  • Teams is for C2: Building and Reversing a Teams RAT - Randy Pargman and Kyle Cucci
  • DotNet Malware Analysis - Max Kersten
Scroll to Top