Selected Papers
Adaptive File Analyzer: NLP combined with Heuristic analysis to detect malicious email attachments.
Abhishek Singh,Kalpesh Mantri, Cisco SBG
Linux. Hypervisor-level behavior analysis
Alexey Kolesnikov, Positive Technologies
The Good, the Bad and the Ugly of Advanced EDR Bypass Tool Frameworks
Andrew Shelton L, K7 Computing Pvt Ltd
Unveiling the DarkGate Malware: A Comprehensive Analysis of Its APT Group, Development Timeline, and Capabilities
Aravind Raj, Nihar Deshpande, Quick Heal
Zero-day exploits of ransomware operators (Windows OS)
Boris Larin, Kaspersky
Once Gifted is always Gifted
Chetan Raghuprasad, Cisco Talos
Fixing the Detection Gap with OfficeXScan- Building Network Deep File Inspection for Office Exploits
Chintan Shah, Trellix
BEYOND THE HORIZON: TRAVELING THE WORLD ON CAMARO DRAGON’S USB FLASH DRIVES
David Driker, Checkpoint
Space Pirates: hack, steal, repeat!
Denis Kuvshinov, Stanislav Rakovsky, Positive Technologies
SmoothOperator – 3CX Supply Chain Attack
Dinesh Devadoss, Niranjan Jayanand, SentinelOne
Turn the tables: How we use GPT to detect phishing websites
Eduard Alles, Marius Benthin, G DATA CyberDefense AG
Don’t flatten yourself: restoring malware with Control-Flow Flattening obfuscation
Geri Revay, Fortinet
GoldenJackal Chronicles: Delving into Enigmas and Unanswered Questions
Giampaolo Dedola, Kaspersky
Reversing Nim binaries
Holger Unterbrink, Cisco Talos
An Efficient Approach for Automating Threat Intelligence Analysis through Similarity Detection
Hyunjong Lee, Kihong Kim, SANDSLab
Unveiling the Stealth Soldier: A Wave of Targeted Surveillance Attacks in North Africa
Israel Gubi, Check Point
Evolution of the crypto-mining botnet targeting Russian users for years
Ivan Korolev, Igor Zdobnov, Doctor Web, Ltd.
MEGALO-(AN)-DON: Uncovering data espionage, blackmailing and shell companies in mobile lending apps targeting Asia
Jagadeesh Chandraiah, Sophos
Abusing Electron-based applications in targeted attacks
Jaromir Horejsi, Trend Micro
Amplifying Threat Intelligence via Generative AI-Driven Aggregation and Enrichment
Jason Zhang, Kyle Campbell, Anomali Inc.
Is Lazarus Preparing for War?
JunSeok Kim, TaeHyeon Song, MyeongSu Lee, MyungUk Han, AhnLab
Plenty of Smish in the Sea – Time to Cast the PhishNet
Khalid Alnajjar, F-Secure Oyj
Revolutionizing Malware Detection: Unleashing the Potential of ML and MITRE TTP’s Integration
Krishna Sawe, Amit Gadhave, Qualys Inc.
ValleyFall Spyware – Tales of malware discovery and hunting in the wild
Marian Gusatu, Gen Digital
UEFI Secure Boot Bypasses and The Dawn of Bootkits
Martin Smolár, ESET
Cybercrime Atlas: Using Maps to Create a More Secure Ecosystem
Michael Daniel, Cyber Threat Alliance
Unraveling the MOVEit Vulnerability: A Journey from Exploitation to Clop Ransomware Infestation
Prashant Tilekar, Forescout Technologies
Let’s Chat about Gross Public Text generation
Righard Zwienenberg, Eddy Willems, ESET, G DATA
Rebrand to X?: SteelClover Cornucopia
Rintaro Koike,Shogo Hayashi, NTT Security Holdings
APT-C-60 : Observing the hunter
Romain Dumont, ESET
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR in the Evolving Cyber Threat Landscape
Sarang Popat Sonawane, Donato Onofri, Crowdstrike
AndroMAG: Android Malware Analysis Assistance tool powered by GPT
Shivang Desai, Microsoft
Multi-hopping in reversed SOCKS – the usage of open source proxies by Chinese threat actors
Vanja Svajcer, Cisco
Very Real Assault on Virtual ESXi: The Evolving Linux Ransomware Threat
Vigneshwaran P, K7 Computing Pvt Ltd
Enhancing Tagging and Data Reduction in the EDR Event Pipeline
Viren Chaudhari, Rohit Kulkarni, Qualys
Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats
Vladimir Strogov,Sergey Ulasen, Acronis
Understanding ransomware rebranding
Vlad Constantin Craciun, Bitdefender
IoT Malware Riding Pegasus – How to Hunt and Analyze GobRAT
Yuma Masubuchi, JPCERT Coordination Center
Reserve Papers
Rising to Prominence: A Deep Dive into TargetCompany’s Evolutionary Path with Mallox
Earle Maui Earnshaw, Trend Micro
CloudWizard: an APT hiding in the dark for 7 years
Georgy Kucherin, Leonid Bezvershenko, Kaspersky
Lazarus and Bluenoroff: New and “Rusty” Tricks for macOS
Mellvin S, K7 Computing Pvt Ltd
The Art of Cyber Espionage: Unleashing the Power of SCADA and ICS Hacking
Muhammad Shahmeer, Younite
Exploring RAM Forensic Analysis for Effective Digital Investigations
Sneha Banerjee, Microsoft

Note:

  • The above is the list of confirmed papers and speakers. More papers and speakers will be added soon. Please bookmark this page to view the detailed AVAR 2023 Agenda.
  • The above list is not in the order of presentation
CISO Connect
Panel Discussion Topics and List of Panelists
Improving data security in the digital-first enterprise
Bassil Mohammed, Senior Director, PwC Middle East
Kiran Kumar, Cybersecurity Director, Help AG
Kumar Prasoon, Founder & CEO, Y100.ai
Siham Benhamidouche, MEA Cybersecurity Officer, Schneider Electric
Positioning cyber security as a contributor to stakeholder value
Aloysius Cheang, President Cybersecurity & Privacy Protection and Chief Security Officer Middle East & Central Asia, Huawei
Amna AL-Balushi, Chief Information Security Officer, Bank Nizwa
Anil Pais, General Manager – IT, Al Danube
Illyas Kooliyankal, Chief Security Advisor & Group CEO, CyberShelter
Javed Alam, Director– Head of Information Security, DAMAC Properties
Dr. Mohammad Khaled, Safe Cognitive and Transformation Thought Leader
Mitigating cyber risk from geopolitical tensions
Anoop Kumar, Information Security Manager, GN Media – Gulfnews
David Brown, Security Operation Director, CyberGate
Dr. Hamad Khalifa Al Nuami, Head of Telecommunications Section Information Technology Center, Abu Dhabi Police General Head Quarter
Dr. Hossam Elshenraki, Professor in Criminal Investigation, Dubai Police Academy
Waqas Haider, Chief Information Security Officer, HBL Microfinance Bank LTD