AGENDA

AVAR 2018

The Dynamic Security Ecosystem

Goa, India.

28th – 30th Nov 2018

Get Practical Insights from High-Profile Security Experts

AVAR2018 Programme

Day 1 – Wednesday, 28th November, 2018

15.00 – 17.00 Wednesday, 28th November, 2018

AVAR Directors Meet

17.30 – 18.30 Wednesday, 28th November, 2018

Registration

18.30 – 21.30 Wednesday, 28th November, 2018

Welcome Drinks Reception

Day 2 – Thursday, 29th November, 2018

8.00 – 9.00 Thursday, 29th November, 2018

Registration

8.30 – 8.50 Thursday, 29th November, 2018

Speakers’ meeting

9.30 – 9.35 Thursday, 29th November, 2018

Opening speech

9.35 – 9.40 Thursday, 29th November, 2018

AVAR Chairman’s address – Allan Dyer

9.40 – 10.10 Thursday, 29th November, 2018

Keynote address 1 – Dr. Sanjay Bahl – Director General,  CERT-In

10.10 – 10.40 Thursday, 29th November, 2018

Keynote address 2 – Rama Vedashree – CEO,  Data Security Council of India

Track 1 Track 2 Let’s Discuss
 

10.40 – 11.10 Thursday, 29th November, 2018

Catching multilayered zero-day attacks on MS Office

Vladislav Stolyarov & Boris Larin
Kaspersky Lab

 

 

10.40 – 11.10 Thursday, 29th November, 2018

Threat Intelligence: Understanding the scope for enterprise security infrastructure

Panel Discussion

11.10 – 11.30 Thursday, 29th November, 2018

Coffee / Tea Break

 

11.30 – 12.00 Thursday, 29th November, 2018

Botception: Botnet distributes script with bot capabilities

Jan Sirmer & Adolf Středa
AVAST Lab

 

11.30 – 12.00 Thursday, 29th November, 2018

The Big Bang Theory By APT-C-23

Lotem Finkelsteen & Aseel Kayal
Check Point Software Technologies

 

11.30 – 12.00 Thursday, 29th November, 2018

Android SOS: The Urgent Need to Secure OS Settings

Anurag Shandilya & V.Dhanalakshmi
K7 Computing

 

12.00 – 12.30 Thursday, 29th November, 2018

Back to the Low-Level: WebAssembly file infection and structure

Daniel (Jinyoung) Choi
AVIRA

 

12.00 – 12.30 Thursday, 29th November, 2018

One (S)hell of a Threat: Gateway to Other Platforms

Michael Jay Villanueva & John Kevin R. Sanchez
Trend Micro

 

12.00 – 12.30 Thursday, 29th November, 2018

Extending Binary Instrumentation To Automate Malware Reversing

Anoop Saldanha & Abhijit Mohanta
Juniper Threat Labs

 

12.30 – 13.00 Thursday, 29th November, 2018

Malaysian government targeted with mash-up espionage toolkit

Tomáš Gardoň & Filip Kafka
ESET

 

12.30 – 13.00 Thursday, 29th November, 2018

Jump from Taiwan to Germany not standing up from a chair: how Winnti group spreads world-wide

Dmitry Tarakanov
Kaspersky Lab

 

12.30 – 13.00 Thursday, 29th November, 2018

An untold story of a Spy

Diwakar Kumar Dinkar & Rahamathulla Hussain
McAfee Labs

13.00 – 14.10 Thursday, 29th November, 2018

Lunch break

 

14.10 – 14.25 Thursday, 29th November, 2018

Sponsor presentation (AV-Comparatives)

 

14.10 – 14.25 Thursday, 29th November, 2018

Sponsor presentation (PolySwarm)

 

14.10 – 15.25 Thursday, 29th November, 2018

Easier WinDbg scripting with Javascript for malware research

Vanja Svajcer
Cisco

 

14.25 – 14.55 Thursday, 29th November, 2018

“The rules exist to violate them” or advanced methods of using classic NIDS

Alexey Vishnyakov
Security Code

 

14.25 – 14.55 Thursday, 29th November, 2018

Smart car forensics and sensor warfare

Gabriel Cirlig & Stefan Tanase
Ixia

 

14.55 – 15.25 Thursday, 29th November, 2018

Fileless Fever: An in-depth Breakdown of Attacks from Poweliks to PowerGhost

Kaarthik RM
K7 Computing

 

14.55 – 15.25 Thursday, 29th November, 2018

Oops! It happened again!

Righard Zwienenberg & Eddy Willems
ESET & G Data

15.25 – 15.45 Thursday, 29th November, 2018

Coffee / Tea Break

 

15.45 – 16.15 Thursday, 29th November, 2018

Applying Deep Learning for PE-malware detection

Ajay Shinde & Sandeep Pimpale
Quick Heal

 

15.45 – 16.15 Thursday, 29th November, 2018

Automated Real-World Testing of Mobile Security Solutions – Android and iOS

Andreas Clementi, Peter Stelzhammer, Christoph Leitner & Philippe Rödlach
AV-Comparatives

 

15.45 – 16.15 Thursday, 29th November, 2018

Artificial Intelligence in Cybersecurity: All hype or only hope?

Panel Discussion

 

16.15 – 16.45 Thursday, 29th November, 2018

The GandCrab Mentality

Joie Salvio & Jasper Libranda Manuel
Fortinet Inc

 

16.15 – 16.45 Thursday, 29th November, 2018

Monitoring Darknet: Are you doing enough?

Muslim Koser
Volon Cyber Security

 

16.15 – 16.45 Thursday, 29th November, 2018

GDPR: Impact of data privacy regulation on cybersecurity

Panel Discussion

 

16.45 – 17.15 Thursday, 29th November, 2018

Hide and Seek: An Investigation into changing dynamics of Android APT’s

Jagadeesh Chandraiah
Sophos

 

16.45 – 17.15 Thursday, 29th November, 2018

How to increase cybercrime: stop cooperating with each other

Dennis Batchelder & Hong Jia
AppEsteem

 

16.45 – 17.15 Thursday, 29th November, 2018

Beyond the Dictionary of the Probable: A Possibility-Based Brute-Force Attack

Randy Abrams & Briana Butler
Webroot

19.00 – 19.30 Thursday, 29th November, 2018

Pre-Dinner Drinks

19.30 – 22.30 Thursday, 29th November, 2018

Gala Dinner

Day 3 – Friday, 30th November, 2018
Track 1 Track 2

09.30 – 10.00 Friday, 30th November, 2018

Cracking the Shell

Christopher D. Del Fierro & John Angelo V. Lipata
G Data

09.30 – 10.00 Friday, 30th November, 2018

DDoS Attack: Groups and Campaigns in China, major tools and techniques

Weike Lu
ThreatBook

10.00 – 10.30 Friday, 30th November, 2018

Demystifying PowerGhost: A Fileless Cryptominer

Tejas Girme
Qualys

10.00 – 10.30 Friday, 30th November, 2018

SiliVaccine: North Korea’s Weapon of Mass Detection

Mark Lechtik
Check Point Software Technologies

10.30 – 11.00 Friday, 30th November, 2018

From Hacking Team to Hacked Team to…?

Filip Kafka
ESET

10.30 – 11.00 Friday, 30th November, 2018

Mobile Cyberespionage: What You Need to Know

Ecular Xu
Trend Micro

11.00 to 11.20 Friday, 30th November, 2018

Coffee / Tea Break

11.20 – 11.50 Friday, 30th November, 2018

Commander-in-chief for Docker Security

Rajesh Nikam
Qualys

11.20 – 11.50 Friday, 30th November, 2018

I’ll connect, Do you “mine”? Digging through the Techniques of Cryptomining Attack in a WiFi Network

John Karlo D. Agon & Lovely Jovellee Lyn S. Bruiz
G Data

11.50 – 12.20 Friday, 30th November, 2018

The EasternRoppels operation: PLATINUM group is back

Alexey Shulmin & Andrey Dolgushev
Kaspersky Lab

11.50 – 12.20 Friday, 30th November, 2018

Using APKLAB.IO Mobile Threat Intel platform to fight banking threats

Nikolaos Chrysaidos
AVAST Software

12.20 – 12.50 Friday, 30th November, 2018

BackSwap – The future of banking malware?

Michal Poslusny & Peter Kalnai
ESET

12.20 – 12.50 Friday, 30th November, 2018

Smart Contract Honeypots for Profit (and probably Fun)

Ben Schmidt
Polyswarm

12.50 to 14.00 Friday, 30th November, 2018

Lunch break

14.00 – 14.15 Friday, 30th November, 2018

Sponsor presentation

14.00 – 14.15 Friday, 30th November, 2018

Sponsor presentation (ESET)

14.15 – 14.45 Friday, 30th November, 2018

Deep-Mining Without a License: How Malicious Cryptominers Dig Across Platforms and Devices

Raja Babu A
K7 Computing

14.15 – 14.45 Friday, 30th November, 2018

Jumping into the Vale of Windows SMB exploits

Pradeep Kulkarni & Sameer Patil
Quick Heal

14.45 – 15.15 Friday, 30th November, 2018

AHK – the new AutoIT

Gabriel Cirlig & Stefan Tanase
Ixia

14.45 – 15.15 Friday, 30th November, 2018

Fighting streaky macro threats: The saga continues

Diwakar Kumar Dinkar & Prajwala Rao K
McAfee Labs

15.15 to 15.35 Friday, 30th November, 2018

Coffee / Tea Break

15.35 – 16.05 Friday, 30th November, 2018

New Frontiers In Cryptojacking

Rishikesh Bhide & Tejas Girme
Qualys

15.35 – 16.05 Friday, 30th November, 2018

The “harmless” $19Bn adware fraud scheme that’s eating your data plan, your battery life and stealing your privacy and personal data.

Dr. Zac Sadan & Rowland Yu
Protected Media & Sophos

16.15 to 16.20 Friday, 30th November, 2018

Thank you speech

16.20 to 16.30 Friday, 30th November, 2018

Announcement: AVAR 2019

16.30 to 16.40 Friday, 30th November, 2018

Closing ceremony

16.40 Friday, 30th November, 2018

AVAR members’ meeting

*Please note that the provisional AVAR 2018 conference agenda above is subject to change at short notice

ONE OF ASIA’s LARGEST CYBER SECURITY CONFERENCE

Map

Don’t hesitate to ask us any questions.