Selected Papers |
Adaptive File Analyzer: NLP combined with Heuristic analysis to detect malicious email attachments. Abhishek Singh,Kalpesh Mantri, Cisco SBG |
Linux. Hypervisor-level behavior analysis Alexey Kolesnikov, Positive Technologies |
The Good, the Bad and the Ugly of Advanced EDR Bypass Tool Frameworks Andrew Shelton L, K7 Computing Pvt Ltd |
Unveiling the DarkGate Malware: A Comprehensive Analysis of Its APT Group, Development Timeline, and Capabilities Aravind Raj, Nihar Deshpande, Quick Heal |
Zero-day exploits of ransomware operators (Windows OS) Boris Larin, Kaspersky |
Once Gifted is always Gifted Chetan Raghuprasad, Cisco Talos |
Fixing the Detection Gap with OfficeXScan- Building Network Deep File Inspection for Office Exploits Chintan Shah, Trellix |
BEYOND THE HORIZON: TRAVELING THE WORLD ON CAMARO DRAGON’S USB FLASH DRIVES David Driker, Checkpoint |
Space Pirates: hack, steal, repeat! Denis Kuvshinov, Stanislav Rakovsky, Positive Technologies |
SmoothOperator – 3CX Supply Chain Attack Dinesh Devadoss, Niranjan Jayanand, SentinelOne |
Turn the tables: How we use GPT to detect phishing websites Eduard Alles, Marius Benthin, G DATA CyberDefense AG |
Don’t flatten yourself: restoring malware with Control-Flow Flattening obfuscation Geri Revay, Fortinet |
GoldenJackal Chronicles: Delving into Enigmas and Unanswered Questions Giampaolo Dedola, Kaspersky |
Reversing Nim binaries Holger Unterbrink, Cisco Talos |
An Efficient Approach for Automating Threat Intelligence Analysis through Similarity Detection Hyunjong Lee, Kihong Kim, SANDSLab |
Unveiling the Stealth Soldier: A Wave of Targeted Surveillance Attacks in North Africa Israel Gubi, Check Point |
Evolution of the crypto-mining botnet targeting Russian users for years Ivan Korolev, Igor Zdobnov, Doctor Web, Ltd. |
MEGALO-(AN)-DON: Uncovering data espionage, blackmailing and shell companies in mobile lending apps targeting Asia Jagadeesh Chandraiah, Sophos |
Abusing Electron-based applications in targeted attacks Jaromir Horejsi, Trend Micro |
Amplifying Threat Intelligence via Generative AI-Driven Aggregation and Enrichment Jason Zhang, Kyle Campbell, Anomali Inc. |
Is Lazarus Preparing for War? JunSeok Kim, TaeHyeon Song, MyeongSu Lee, MyungUk Han, AhnLab |
Plenty of Smish in the Sea – Time to Cast the PhishNet Khalid Alnajjar, F-Secure Oyj |
Revolutionizing Malware Detection: Unleashing the Potential of ML and MITRE TTP’s Integration Krishna Sawe, Amit Gadhave, Qualys Inc. |
ValleyFall Spyware – Tales of malware discovery and hunting in the wild Marian Gusatu, Gen Digital |
UEFI Secure Boot Bypasses and The Dawn of Bootkits Martin Smolár, ESET |
Cybercrime Atlas: Using Maps to Create a More Secure Ecosystem Michael Daniel, Cyber Threat Alliance |
Unraveling the MOVEit Vulnerability: A Journey from Exploitation to Clop Ransomware Infestation Prashant Tilekar, Forescout Technologies |
Let’s Chat about Gross Public Text generation Righard Zwienenberg, Eddy Willems, ESET, G DATA |
Rebrand to X?: SteelClover Cornucopia Rintaro Koike,Shogo Hayashi, NTT Security Holdings |
APT-C-60 : Observing the hunter Romain Dumont, ESET |
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR in the Evolving Cyber Threat Landscape Sarang Popat Sonawane, Donato Onofri, Crowdstrike |
AndroMAG: Android Malware Analysis Assistance tool powered by GPT Shivang Desai, Microsoft |
Multi-hopping in reversed SOCKS – the usage of open source proxies by Chinese threat actors Vanja Svajcer, Cisco |
Very Real Assault on Virtual ESXi: The Evolving Linux Ransomware Threat Vigneshwaran P, K7 Computing Pvt Ltd |
Enhancing Tagging and Data Reduction in the EDR Event Pipeline Viren Chaudhari, Rohit Kulkarni, Qualys |
Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats Vladimir Strogov,Sergey Ulasen, Acronis |
Understanding ransomware rebranding Vlad Constantin Craciun, Bitdefender |
IoT Malware Riding Pegasus – How to Hunt and Analyze GobRAT Yuma Masubuchi, JPCERT Coordination Center |
Reserve Papers |
Rising to Prominence: A Deep Dive into TargetCompany’s Evolutionary Path with Mallox Earle Maui Earnshaw, Trend Micro |
CloudWizard: an APT hiding in the dark for 7 years Georgy Kucherin, Leonid Bezvershenko, Kaspersky |
Lazarus and Bluenoroff: New and “Rusty” Tricks for macOS Mellvin S, K7 Computing Pvt Ltd |
The Art of Cyber Espionage: Unleashing the Power of SCADA and ICS Hacking Muhammad Shahmeer, Younite |
Exploring RAM Forensic Analysis for Effective Digital Investigations Sneha Banerjee, Microsoft |
Note:
- The above is the list of confirmed papers and speakers. More papers and speakers will be added soon. Please bookmark this page to view the detailed AVAR 2023 Agenda.
- The above list is not in the order of presentation
CISO Connect |
Panel Discussion Topics and List of Panelists |
Improving data security in the digital-first enterprise Bassil Mohammed, Senior Director, PwC Middle East Kiran Kumar, Cybersecurity Director, Help AG Kumar Prasoon, Founder & CEO, Y100.ai Siham Benhamidouche, MEA Cybersecurity Officer, Schneider Electric |
Positioning cyber security as a contributor to stakeholder value Aloysius Cheang, President Cybersecurity & Privacy Protection and Chief Security Officer Middle East & Central Asia, Huawei Amna AL-Balushi, Chief Information Security Officer, Bank Nizwa Anil Pais, General Manager – IT, Al Danube Illyas Kooliyankal, Chief Security Advisor & Group CEO, CyberShelter Javed Alam, Director– Head of Information Security, DAMAC Properties Dr. Mohammad Khaled, Safe Cognitive and Transformation Thought Leader |
Mitigating cyber risk from geopolitical tensions Anoop Kumar, Information Security Manager, GN Media – Gulfnews David Brown, Security Operation Director, CyberGate Dr. Hamad Khalifa Al Nuami, Head of Telecommunications Section Information Technology Center, Abu Dhabi Police General Head Quarter Dr. Hossam Elshenraki, Professor in Criminal Investigation, Dubai Police Academy Waqas Haider, Chief Information Security Officer, HBL Microfinance Bank LTD |