演讲嘉宾更新中

演讲征集
*按照第一演讲者的姓氏排序

Eduardo Altares & Jason Pantig
Symantec

The Art of War and Malware Immunity

More…

Raja Babu Annamala & Georgelin Manuel
K7 Computing

Malware Antibodies: A Prototype for Adaptive Immune Response to Threats

More…

Ankit Anubhav
NewSky Security

The evolution of IoT threats, and drawing parallels with the conventional malware landscape

More…

Irfan Asrar
McAfee

2017 The year of the MobileMalvertising

More…

Tiberius Axinte
Bitdefender

Cyberespionage on macOS: APT28 The Whole Puzzle

More…

Jagadeesh Chandraiah
Sophos

Do or Die: Fighting back against constantly Evolving Google play Android Malware

More…

Alexander Chistyakov
Kaspersky

Detection is not a classification: reviewing machine learning techniques for cybersecurity specifics.

More…

Anton Cherepanov & Robert Lipovsky
ESET

Industroyer: The biggest threat to industrial control systems since Stuxnet

More…

Romain Dumont
ESET

OceanLotus in 2017: An update on their activity and toolset

More…

Berman Enconado & Jayendra Pathak
NSS Labs

Malware Evasion

More…

Xiaolong Guo & Lei Bi
Tencent

Watch out before scan: Emerging Malicious Use of QR Code by Cyber Criminals

More…

Karl Hiramoto
VirusTotal

VirusTotal:  a Community Approach

More…

Andrew L. Go & Wren Fer M. Balangcod
G Data

Why buy, if you can DIY?Developing an effective, cost-efficient IoT Honeypot System through Virtualization

More…

Chili Ivona-Alexandra
Bitdefender

Operation “PZCHAO” – Going back to Iron Tiger

More…

Jianpeng Mo
OPSWAT

Advanced Persistent Threats Attack on Internet of Things

More…

Filip Kafka
ESET

FinFisher: New techniques and infection vector revealed

More…

Peter Kálnai & Michal Poslusny
ESET

Lazarus toolset: restoring the old painting in a new frame

More…

William Lee & Joshua Saxe
Sophos

Your app has a malicious app id: Malicious Android package name detection using recurrent neural networks.

More…

Georgelin Manuel
K7 Computing

Detecting Advanced Powershell Threats (APTs) with Machine Learning

More…

Daisuke Nakajima
McAfee

Practical Workflow of Human-Aided and Automated Machine Learning-based Android Malware Detection

More…

Ciprian Oprisa
Bitdefender

A study of insecure protocols for setting up IoT devices

More…

John Kevin Sanchez & Michael Jay Villanueva
Trendmicro

Never the Less with Fileless

More…

Jiangning Shao
Microsoft

On AI powered cyber threat protection

More…

Tatyana Shishkova & Alexey Vishnyakov
Kaspersky

Fatal attack or false alarm? What your web traffic reveals about intruders

More…

Dennis Tan
Symantec

The story of the botnets behind malicious spam campaigns

More…

Dmitry Tarakanov & Alexey Shulmin
Kaspersky

DarkPulsar Implant role in FuzzBunch and DanderSpritz frameworks

More…

Cristina Vatamanu
Bitdefender

EHDevel – The story of a continuously improving advanced threat creation toolkit

More…

Jin Yang
ThreatBook

Through the sword of air – Hacking Bluetooth 4.0 BLE Protocol

More…

Jingyu Yang & Fan Dang
Tencent & Tsinghua University

An IoT Honeypot Device for Malware Forensics

More…

Chao Ye
Rising

Machine Learning-based Malware Detection

More…

Rowland Yu
Sophos

POS (Attacks): When Modern Meets Tradition

More…