Host Organization
VaksinCom
Organizer
Wayang Golek
Supporting Organizations
Balisoft
Co-Organizer
Biskom
Solution Graphics

Program of AVAR2010

Conference Details
Name AVAR2010 13th Association of anti Virus Asia Researchers International Conference
Date 17th (Wednesday) to 19th (Friday) November, 2010
Venue Grand Hyatt, Nusa Dua, Bali, Indonesia

Day 1 Main Stream / 18 November 2010

Paper Title Info

Buckle up Security Belt When Enjoying Ride on Internet of Things
* Peter Wei - Senior Software Architect, Trend Micro
* Liang-Seng Koh - Trend Micro Inc

Info/Abstract
Using Memory Forensics for Identification and Attribution of Malware
* Scott Mann - Director, Invest-e-gate
Info/Abstract
Adobe: The currently most exploited software in the world
* Roel Schouwenberg - Senior anti-virus researcher Global Research & Analysis Team, Kaspersky Lab
Info/Abstract
The rise of icon attacks
* Cristian Lungu - Senior Virus Researcher Heuristic Research Team, Proactivity and Kernel Research Department, BitDefender
Info/Abstract
The Fileless Whitelisting and False Positive Testing
* Kyu-Beom Hwang - Antivirus Expert, Senior Antivirus Researcher, Research Planning and Coordination, R&D Center, AhnLab, Inc.
Info/Abstract
Getting rich with mobile malware: the how, the where, and the $$$
* Denis Maslennikov - Mobile Research Group Manager, Kaspersky Lab
Info/Abstract
The Difference Between False Positives and False Positives in Testing
* Mark Kennedy - Distinguished Engineer, Security Technology And Response, Anti-Virus/Anti-Spyware Engines, Behavior Blocking, Symantec Corporation
Info/Abstract
Metamorphic Virus: Is it Amenable for Algorithmic Detection?
* N.V. Narendra Kumar - School of Technology & Computer Science, Tata Institute of Fundamental Research, Mumbai, India
* Vivek Goswami - Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India
* Richya Bansal - National Institute of Technology, Tiruchirappalli, India
&Computer Science, Tata Institute of Fundamental Research, Mumbai, India
Info/Abstract
An insight into managed downloaders
* Scott Molenkamp - Microsoft Corp
Info/Abstract

Day 2 Main Stream / 19 November 2010

Paper Title Info
China Cybercrime and Government Enforcement – the Oriental Dragon Launches Alliance to Improve its Threat Landscape
* Wei Yan - Security Solution Architect, HS USA
* Fengmin Gong - Chief Scientist, HS USA
Info/Abstract
Network detection of PE structural anomalies and linker characteristics
* Gary Golomb, Principal Security Researcher, NetWitness Corporation
Info/Abstract
Test Files and Product Evaluation: the Case for and against Malware Simulation
* David Harley - Research Fellow & Director of Malware Intelligence, CISSP FBCS CITP, ESET
* Lysa Meyers - Director of Research, West Coast Labs
* Eddy Willems - Security Evangelist, G Data's Security Labs
Info/Abstract
Malware Paradox – Persistent Cross Interface Attacks
* Aditya K Sood - PhD Candidate Michigan State University
* Richard J Enbody - Associate Professor, Michigan State University
Info/Abstract
Is Spam Dying
* Rowland YU - SophosLabs, Australia
Info/Abstract
Image spam filtering by optical pattern matching
* Evgeny Smirnov - Kaspersky Lab
Info/Abstract
Surviving Targeted Attacks: Beyond Today and Tomorrow
* Stefan Tanase - Senior Security Researcher, Kaspersky Lab
* Costin G. Raiu - Director, Global Research and Analysis Team, Kaspersky Lab
Info/Abstract
A Frontline View of the Threat Landscape - from Microsoft Security Intelligence Report 1H10
* Tony Lee - Microsoft
Info/Abstract

Day 1 Back-2-Back / 18 November 2010

Paper Title Info
Risking the Symbian OS
* Marchelle David - Independent Security Researcher
Info/Abstract
Mobile Malware: Status and Countermeasure
* Shihong Zou - Vice President Research Center, NetQin Mobile Inc.
Info/Abstract
Ready to launch 'Sandbox" now?
* Jie Zhang - Manager, Antivirus Team, Fortinet Inc.
* Raul Alvarez - Senior Malware Analyst, Antivrus Team, Fortinet Inc.
Info/Abstract
High Speed JavaScript Malware Sandbox
* Rajesh Mony - Webroot
Info/Abstract
So, what is the government doing?
* Hirotake Hayashi, Representive of Ministry of Economy, Trade and Industry, Japan
Info/Abstract
Cloudy with a Chanche of Malicious URLs
* Wing Fei, Chia - Senior Manager, Security Response, F-Secure Labs
Info/Abstract
Portable Document Format or Pretty Dangerous File?
* Kazumasa Itabashi - Symantec Corporation, Security Response
Info/Abstract
Weightwatching: Why prevalence and persistence matter in Anti-malware testing
* Andrew Lee - Chief Technology Officer, K7 Computing
* Lysa Meyers - Director of Research, West Coast Labs
* Matt Garrad - Director of Technical Services, West Coast Labs
* Michael Parsons
Info/Abstract

Day 2 Back-2-Back / 19 November 2010

Paper Title Info
Hot Topics in Modern Malware
* Andrew Lee- K7
 
The Power of US
* Dr. Igor Muttik - McAfee Labs Senior Architect
Info/Abstract
An Automated Malware Processing Lab
* Jim Cai - Senior Manager, Fortinet Beijing
Info/Abstract
The Current State of Sample and Metadata Sharing
* Dmitry Gryaznov - Sr. Research Architect, McAfee Labs
Info/Abstract
Behavior-Based Detection for file infectors
* Rajesh Nikam - Lead Research Engineer, Quick Heal Technologies Pvt Ltd
Info/Abstract
Cleanup to Damage Recover -Solution for PE Virus Infection and Beyond
* Zhihe Zhang - Senior Development Manager, China Development Center, Core Tech Division, Trend Micro, Inc.
Info/Abstract

Reserve Papers

Paper Title Info
Targeting your Source Code: Stuxnet, Aurora, Induc and New Attack Vectors targeting global brands
* Moderator: Mario Vuksan
* Panelists: Randy Abrams (Eset), Jonathan Poon (Microsoft), Jamz Yaneza (Trend Micro), Roel Schouwenberg (Kaspersky), Righard Zwienenberg (Norman), Possible panelist: Zhang Jian (Tianjin CCCERT)
Info/Abstract



Related Links

Registration

 

 


The program for AVAR2010 can be subjected to changes. The AVAR2010 Organizer reserves the right to revise or change the program.