Buckle up Security Belt When Enjoying Ride on Internet of Things
* Peter Wei - Senior Software Architect, Trend Micro * Liang-Seng Koh - Trend Micro Inc |
 |
Using Memory Forensics for Identification and Attribution of Malware
* Scott Mann - Director, Invest-e-gate |
 |
Adobe: The currently most exploited software in the world
* Roel Schouwenberg - Senior anti-virus researcher Global Research & Analysis Team, Kaspersky Lab |
 |
The rise of icon attacks
* Cristian Lungu - Senior Virus Researcher Heuristic Research Team, Proactivity and Kernel Research Department, BitDefender |
 |
The Fileless Whitelisting and False Positive Testing
* Kyu-Beom Hwang - Antivirus Expert, Senior Antivirus Researcher, Research Planning and Coordination, R&D Center, AhnLab, Inc. |
 |
Getting rich with mobile malware: the how, the where, and the $$$
* Denis Maslennikov - Mobile Research Group Manager, Kaspersky Lab |
 |
The Difference Between False Positives and False Positives in Testing
* Mark Kennedy - Distinguished Engineer, Security Technology And Response, Anti-Virus/Anti-Spyware Engines, Behavior Blocking, Symantec Corporation |
 |
Metamorphic Virus: Is it Amenable for Algorithmic Detection?
* N.V. Narendra Kumar - School of Technology & Computer Science, Tata Institute of Fundamental Research, Mumbai, India
* Vivek Goswami - Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India
* Richya Bansal - National Institute of Technology, Tiruchirappalli, India
&Computer Science, Tata Institute of Fundamental Research, Mumbai, India |
 |
An insight into managed downloaders
* Scott Molenkamp - Microsoft Corp |
 |