AVAR 2018

The Dynamic Security Ecosystem

Goa, India.

28th – 30th Nov 2018

Join the Top Security Minds in Asia-Pacific

SPEAKERS – AVAR 2018

Thank you for submitting your abstract for AVAR 2018. The abstract selection process is now complete

Theme :  “The Dynamic Security Ecosystem’ .

The ecosystem of digital technology is in constant flux with an ever-growing set of devices and servers, communication channels, platforms, apps, etc., thus increasing the attack surface for cyber criminals. The security response to these challenges must evolve quickly and effectively to provide robust protection at the multifarious layers. At AVAR 2018 we’re seeking to explore the nature of these challenges and the countermeasures to tackle them.

PAPERS

* In alphabetical order by organization name

   

Jan Sirmer & Adolf Středa

AVAST Software


Botception: Botnet distributes script with bot capabilities

More..

Nikolaos Chrysaidos

AVAST Software


Using APKLAB.IO Mobile Threat Intel platform to fight banking threats

More..

         

Andreas Clementi & Peter Stelzhammer & Christoph Leitner & Philippe Rödlach

AV-Comparatives


Automated Real-World Testing of Mobile Security Solutions – Android and iOS

More..

Daniel (Jinyoung) Choi

AVIRA


Back to the Low-Level: WebAssembly file infection and structure

More..

   

Dennis Batchelder & Hong Jia

AppEsteem


How to increase cybercrime: stop cooperating with each other

More..

   

Lotem Finkelsteen & Aseel Kayal

Check Point


The Big Bang Theory By APT-C-23

More..

Mark Lechtik

Check Point


SiliVaccine: North Korea’s Weapon of Mass Detection

More..

Vanja Svajcer

Cisco


Easier WinDbg scripting with Javascript for malware research

More..

Filip Kafka

ESET


From Hacking Team to Hacked Team to…?

More..

   

Michal Poslusny & Peter Kalnai

ESET


BackSwap – The future of banking malware?

More..

   

Tomáš Gardoň & Filip Kafka

ESET


Malaysian government targeted with mash-up espionage toolkit

More..

  

Righard Zwienenberg & Eddy Willems

ESET & G Data


Oops! It happened again!

More..

   

Joie Salvio & Jasper Libranda Manuel

Fortinet Inc


The GandCrab Mentality

More..

   

Christopher D. Del Fierro & John Angelo V. Lipata

G Data


Cracking the Shell

More..

   

John Karlo D. Agon & Lovely Jovellee Lyn S. Bruiz

G Data


I’ll connect, Do you “mine”? Digging through the Techniques of Cryptomining Attack in a WiFi Network

More..

   

Gabriel Cirlig & Stefan Tanase

Ixia


AHK – the new AutoIT

More..

   

Gabriel Cirlig & Stefan Tanase

Ixia


Smart car forensics and sensor warfare

More..

   

Anoop Saldanha & Abhijit Mohanta

Juniper Threat Labs


Extending Binary Instrumentation To Automate Malware Reversing

More..

   

Alexey Shulmin & Andrey Dolgushev

Kaspersky Lab


The EasternRoppels operation: PLATINUM group is back

More..

Dmitry Tarakanov

Kaspersky Lab


Jump from Taiwan to Germany not standing up from a chair: how Winnti group spreads world-wide

More..

   

Vladislav Stolyarov & Boris Larin

Kaspersky Lab


Catching multilayered zero-day attacks on MS Office

More..

   

Anurag Shandilya & V.Dhanalakshmi

K7 Computing


Android SOS: The Urgent Need to Secure OS Settings

More..

Kaarthik RM

K7 Computing


Fileless Fever: An in-depth Breakdown of Attacks from Poweliks to PowerGhost

More..

Raja Babu A

K7 Computing


Deep-Mining Without a License: How Malicious Cryptominers Dig Across Platforms and Devices

More..

   

Diwakar Kumar Dinkar & Prajwala Rao K

McAfee Labs


Fighting streaky macro threats: The saga continues

More..

   

Diwakar Kumar Dinkar & Rahamathulla Hussain

McAfee Labs


An untold story of a Spy

More..

Ben Schmidt

Polyswarm


Smart Contract Honeypots for Profit (and probably Fun)

More..

   

Dr. Zac Sadan & Rowland Yu

Protected Media & Sophos


The “harmless” $19Bn adware fraud scheme that’s eating your data plan, your battery life and stealing your privacy and personal data.

More..

Rajesh Nikam

Qualys


Commander-in-chief for Docker Security

More..

Tejas Girme

Qualys


Demystifying PowerGhost: A Fileless Cryptominer

More..

   

Rishikesh Bhide & Tejas Girme

Qualys


New Frontiers In Cryptojacking

More..

   

Ajay Shinde & Sandeep Pimpale

Quick Heal


Applying Deep Learning for PE-malware detection

More..

   

Pradeep Kulkarni & Sameer Patil

Quick Heal


Jumping into the Vale of Windows SMB exploits

More..

Alexey Vishnyakov

Security Code


The rules exist to violate them” or advanced methods of using classic NIDS

More..

Jagadeesh Chandraiah

Sophos


Hide and Seek: An Investigation into changing dynamics of Android APT’s

More..

Weike Lu

ThreatBook


DDoS Attack: Groups and Campaigns in China, major tools and techniques

More..

   

Michael Jay Villanueva & John Kevin R. Sanchez

Trend Micro


One (S)hell of a Threat: Gateway to Other Platforms

More..

Ecular Xu

Trend Micro


Mobile Cyberespionage: What You Need to Know

More..

Muslim Koser

Volon Cyber Security


Monitoring Darknet: Are you doing enough?

More..

   

Briana Butler & Randy Abrams

Webroot


Beyond the Dictionary of the Probable: A Possibility-Based Brute-Force Attack

More..

Map

Don’t hesitate to ask us any questions.