AGENDA
AVAR 2018
The Dynamic Security Ecosystem
Goa, India.
28th – 30th Nov 2018
Get Practical Insights from High-Profile Security Experts
AVAR2018 Programme
|
||
---|---|---|
Day 1 – Wednesday, 28th November, 2018 | ||
15.00 – 17.00 Wednesday, 28th November, 2018 AVAR Directors Meet |
||
17.30 – 18.30 Wednesday, 28th November, 2018 Registration |
||
18.30 – 21.30 Wednesday, 28th November, 2018 Welcome Drinks Reception |
Day 2 – Thursday, 29th November, 2018 | ||||
---|---|---|---|---|
8.00 – 9.00 Thursday, 29th November, 2018 Registration |
||||
8.30 – 8.50 Thursday, 29th November, 2018 Speakers’ meeting |
||||
9.30 – 9.35 Thursday, 29th November, 2018 Opening speech |
||||
9.35 – 9.40 Thursday, 29th November, 2018 AVAR Chairman’s address – Allan Dyer |
||||
9.40 – 10.10 Thursday, 29th November, 2018 Keynote address 1 – Dr. Sanjay Bahl – Director General, CERT-In |
||||
10.10 – 10.40 Thursday, 29th November, 2018 Keynote address 2 – Rama Vedashree – CEO, Data Security Council of India |
||||
Track 1 | Track 2 | Let’s Discuss | ||
10.40 – 11.10 Thursday, 29th November, 2018 Catching multilayered zero-day attacks on MS Office Vladislav Stolyarov & Boris Larin |
|
10.40 – 11.10 Thursday, 29th November, 2018 Threat Intelligence: Understanding the scope for enterprise security infrastructure Panel Discussion |
||
11.10 – 11.30 Thursday, 29th November, 2018 Coffee / Tea Break |
||||
11.30 – 12.00 Thursday, 29th November, 2018 Botception: Botnet distributes script with bot capabilities Jan Sirmer & Adolf Středa |
11.30 – 12.00 Thursday, 29th November, 2018 The Big Bang Theory By APT-C-23 Lotem Finkelsteen & Aseel Kayal |
11.30 – 12.00 Thursday, 29th November, 2018 Android SOS: The Urgent Need to Secure OS Settings Anurag Shandilya & V.Dhanalakshmi |
||
12.00 – 12.30 Thursday, 29th November, 2018 Back to the Low-Level: WebAssembly file infection and structure Daniel (Jinyoung) Choi |
12.00 – 12.30 Thursday, 29th November, 2018 One (S)hell of a Threat: Gateway to Other Platforms Michael Jay Villanueva & John Kevin R. Sanchez |
12.00 – 12.30 Thursday, 29th November, 2018 Extending Binary Instrumentation To Automate Malware Reversing Anoop Saldanha & Abhijit Mohanta |
||
12.30 – 13.00 Thursday, 29th November, 2018 Malaysian government targeted with mash-up espionage toolkit Tomáš Gardoň & Filip Kafka |
12.30 – 13.00 Thursday, 29th November, 2018 Jump from Taiwan to Germany not standing up from a chair: how Winnti group spreads world-wide Dmitry Tarakanov |
12.30 – 13.00 Thursday, 29th November, 2018 Diwakar Kumar Dinkar & Rahamathulla Hussain |
||
13.00 – 14.10 Thursday, 29th November, 2018 Lunch break |
||||
14.10 – 14.25 Thursday, 29th November, 2018 Sponsor presentation (AV-Comparatives) |
14.10 – 14.25 Thursday, 29th November, 2018 Sponsor presentation (PolySwarm) |
14.10 – 15.25 Thursday, 29th November, 2018 Easier WinDbg scripting with Javascript for malware research Vanja Svajcer |
||
14.25 – 14.55 Thursday, 29th November, 2018 “The rules exist to violate them” or advanced methods of using classic NIDS Alexey Vishnyakov |
14.25 – 14.55 Thursday, 29th November, 2018 Smart car forensics and sensor warfare Gabriel Cirlig & Stefan Tanase |
|||
14.55 – 15.25 Thursday, 29th November, 2018 Fileless Fever: An in-depth Breakdown of Attacks from Poweliks to PowerGhost Kaarthik RM |
14.55 – 15.25 Thursday, 29th November, 2018 Righard Zwienenberg & Eddy Willems |
|||
15.25 – 15.45 Thursday, 29th November, 2018 Coffee / Tea Break |
||||
15.45 – 16.15 Thursday, 29th November, 2018 Applying Deep Learning for PE-malware detection Ajay Shinde & Sandeep Pimpale |
15.45 – 16.15 Thursday, 29th November, 2018 Automated Real-World Testing of Mobile Security Solutions – Android and iOS Andreas Clementi, Peter Stelzhammer, Christoph Leitner & Philippe Rödlach |
15.45 – 16.15 Thursday, 29th November, 2018 Artificial Intelligence in Cybersecurity: All hype or only hope? Panel Discussion |
||
16.15 – 16.45 Thursday, 29th November, 2018 Joie Salvio & Jasper Libranda Manuel |
16.15 – 16.45 Thursday, 29th November, 2018 Monitoring Darknet: Are you doing enough? Muslim Koser |
16.15 – 16.45 Thursday, 29th November, 2018 GDPR: Impact of data privacy regulation on cybersecurity Panel Discussion |
||
16.45 – 17.15 Thursday, 29th November, 2018 Hide and Seek: An Investigation into changing dynamics of Android APT’s Jagadeesh Chandraiah |
16.45 – 17.15 Thursday, 29th November, 2018 How to increase cybercrime: stop cooperating with each other Dennis Batchelder & Hong Jia |
16.45 – 17.15 Thursday, 29th November, 2018 Beyond the Dictionary of the Probable: A Possibility-Based Brute-Force Attack Randy Abrams & Briana Butler |
||
19.00 – 19.30 Thursday, 29th November, 2018 Pre-Dinner Drinks |
||||
19.30 – 22.30 Thursday, 29th November, 2018 Gala Dinner |
Day 3 – Friday, 30th November, 2018 | |||
---|---|---|---|
Track 1 | Track 2 | ||
09.30 – 10.00 Friday, 30th November, 2018 Christopher D. Del Fierro & John Angelo V. Lipata |
09.30 – 10.00 Friday, 30th November, 2018 DDoS Attack: Groups and Campaigns in China, major tools and techniques Weike Lu |
||
10.00 – 10.30 Friday, 30th November, 2018 Demystifying PowerGhost: A Fileless Cryptominer Tejas Girme |
10.00 – 10.30 Friday, 30th November, 2018 SiliVaccine: North Korea’s Weapon of Mass Detection Mark Lechtik |
||
10.30 – 11.00 Friday, 30th November, 2018 From Hacking Team to Hacked Team to…? Filip Kafka |
10.30 – 11.00 Friday, 30th November, 2018 Mobile Cyberespionage: What You Need to Know Ecular Xu |
||
11.00 to 11.20 Friday, 30th November, 2018 Coffee / Tea Break |
|||
11.20 – 11.50 Friday, 30th November, 2018 Commander-in-chief for Docker Security Rajesh Nikam |
11.20 – 11.50 Friday, 30th November, 2018 I’ll connect, Do you “mine”? Digging through the Techniques of Cryptomining Attack in a WiFi Network John Karlo D. Agon & Lovely Jovellee Lyn S. Bruiz |
||
11.50 – 12.20 Friday, 30th November, 2018 The EasternRoppels operation: PLATINUM group is back Alexey Shulmin & Andrey Dolgushev |
11.50 – 12.20 Friday, 30th November, 2018 Using APKLAB.IO Mobile Threat Intel platform to fight banking threats Nikolaos Chrysaidos |
||
12.20 – 12.50 Friday, 30th November, 2018 BackSwap – The future of banking malware? Michal Poslusny & Peter Kalnai |
12.20 – 12.50 Friday, 30th November, 2018 Smart Contract Honeypots for Profit (and probably Fun) Ben Schmidt |
||
12.50 to 14.00 Friday, 30th November, 2018 Lunch break |
|||
14.00 – 14.15 Friday, 30th November, 2018 Sponsor presentation
|
14.00 – 14.15 Friday, 30th November, 2018 Sponsor presentation (ESET)
|
||
14.15 – 14.45 Friday, 30th November, 2018 Deep-Mining Without a License: How Malicious Cryptominers Dig Across Platforms and Devices Raja Babu A |
14.15 – 14.45 Friday, 30th November, 2018 Jumping into the Vale of Windows SMB exploits Pradeep Kulkarni & Sameer Patil |
||
14.45 – 15.15 Friday, 30th November, 2018 Gabriel Cirlig & Stefan Tanase |
14.45 – 15.15 Friday, 30th November, 2018 Fighting streaky macro threats: The saga continues Diwakar Kumar Dinkar & Prajwala Rao K |
||
15.15 to 15.35 Friday, 30th November, 2018 Coffee / Tea Break |
|||
15.35 – 16.05 Friday, 30th November, 2018 New Frontiers In Cryptojacking Rishikesh Bhide & Tejas Girme |
15.35 – 16.05 Friday, 30th November, 2018 Dr. Zac Sadan & Rowland Yu |
||
16.15 to 16.20 Friday, 30th November, 2018 Thank you speech |
|||
16.20 to 16.30 Friday, 30th November, 2018 Announcement: AVAR 2019 |
|||
16.30 to 16.40 Friday, 30th November, 2018 Closing ceremony |
|||
16.40 Friday, 30th November, 2018 AVAR members’ meeting |
*Please note that the provisional AVAR 2018 conference agenda above is subject to change at short notice