Another day of excellent presentations.
The second day of VB2014 was just as successful as the first one, and saw 22 interesting presentations, divided over two parallel streams, on a wide range of security topics. They included the seven
last-minute papers
that were added to the programme only three weeks ago.

Just as yesterday, many speakers let us share their presentation slides, and we hope to add more after the conference:
-
Malware Investigator
(Jonathan Burns,
Federal Bureau of Investigation
;
abstract
) -
Notes on click fraud: American story
(Peter Kalnai, Jaromir Horejsi,
AVAST Software
;
abstract
) -
Optimized mal-ops. Hack the ad network like a boss
(Vadim Kotov,
Bromium
;
abstract
) -
Adventures in open directories
(Matt Bing,
Arbor Networks
;
abstract
) -
.NET malware dynamic instrumentation for automated and manual analysis
(Hexiang Hu,
Microsoft
;
abstract
) -
Killing the rootkit – perfect physical memory process detection
(Shane Macaulay,
IOActive
;
abstract
) -
Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam
(Jérôme Segura,
Malwarebytes
;
abstract
) -
Attack points in health apps & wearable devices – how safe is your quantified self?
(Candid Wüest,
Symantec
;
abstract
)
The day’s conference activities are not yet over for today though, and delegates are eagerly anticipating the VB gala dinner tonight. As always, the gala dinner promises to be a fun-filled evening, and importantly, it will also see the presentation of the first annual
Péter Ször award
, in honour of the brilliant, and much missed researcher (and VB advisory board member) who passed away last year.
Enjoy the gala dinner – and see you tomorrow!
Posted on 25 September 2014 by
Martijn Grooten
Leave a Reply