AVAR 2018
The Dynamic Security Ecosystem
Goa, India.
28th – 30th Nov 2018
Join the Top Security Minds in Asia-Pacific
SPEAKERS – AVAR 2018
Thank you for submitting your abstract for AVAR 2018. The abstract selection process is now complete
Theme : “The Dynamic Security Ecosystem’ .
The ecosystem of digital technology is in constant flux with an ever-growing set of devices and servers, communication channels, platforms, apps, etc., thus increasing the attack surface for cyber criminals. The security response to these challenges must evolve quickly and effectively to provide robust protection at the multifarious layers. At AVAR 2018 we’re seeking to explore the nature of these challenges and the countermeasures to tackle them.
PAPERS
* In alphabetical order by organization name
Jan Sirmer & Adolf Středa
AVAST Software
Botception: Botnet distributes script with bot capabilities
Nikolaos Chrysaidos
AVAST Software
Using APKLAB.IO Mobile Threat Intel platform to fight banking threats
Andreas Clementi & Peter Stelzhammer & Christoph Leitner & Philippe Rödlach
AV-Comparatives
Automated Real-World Testing of Mobile Security Solutions – Android and iOS
Dennis Batchelder & Hong Jia
AppEsteem
How to increase cybercrime: stop cooperating with each other
John Karlo D. Agon & Lovely Jovellee Lyn S. Bruiz
G Data
I’ll connect, Do you “mine”? Digging through the Techniques of Cryptomining Attack in a WiFi Network
Anoop Saldanha & Abhijit Mohanta
Juniper Threat Labs
Extending Binary Instrumentation To Automate Malware Reversing
Alexey Shulmin & Andrey Dolgushev
Kaspersky Lab
The EasternRoppels operation: PLATINUM group is back
Dmitry Tarakanov
Kaspersky Lab
Jump from Taiwan to Germany not standing up from a chair: how Winnti group spreads world-wide
Vladislav Stolyarov & Boris Larin
Kaspersky Lab
Catching multilayered zero-day attacks on MS Office
Anurag Shandilya & V.Dhanalakshmi
K7 Computing
Android SOS: The Urgent Need to Secure OS Settings
Kaarthik RM
K7 Computing
Fileless Fever: An in-depth Breakdown of Attacks from Poweliks to PowerGhost
Raja Babu A
K7 Computing
Deep-Mining Without a License: How Malicious Cryptominers Dig Across Platforms and Devices
Diwakar Kumar Dinkar & Prajwala Rao K
McAfee Labs
Fighting streaky macro threats: The saga continues
Dr. Zac Sadan & Rowland Yu
Protected Media & Sophos
The “harmless” $19Bn adware fraud scheme that’s eating your data plan, your battery life and stealing your privacy and personal data.
Alexey Vishnyakov
Security Code
The rules exist to violate them” or advanced methods of using classic NIDS
Jagadeesh Chandraiah
Sophos
Hide and Seek: An Investigation into changing dynamics of Android APT’s
Michael Jay Villanueva & John Kevin R. Sanchez
Trend Micro
One (S)hell of a Threat: Gateway to Other Platforms