Malware Reverse Engineering Workshop 2014
MRE2014 was held on August 25th, and was a great success. We thank our presenters and attendees, and a special thanks to our sponsor PhishLabs.
Following the success of the 2013 Malware Reverse Engineering workshop, we are holding the 2014 event this August in Melbourne. We are pleased to announce that the Malware Reverse Engineering workshop (MRE) is open for registration. This workshop aims to share technical advances in the field of malware analysis, including static analysis, behavioural analysis and recent findings in malware internals.
This year's event is sponsored by PhishLabs, a fast-growing company that provides cybercrime protection and intelligence services. Their clients including many of the most targeted businesses in the world, including 4 of the top 5 US financial institutions, and several banks in Australia and New Zealand.
2014's event was hosted by the Internet Commerce Security Laboratory at Federation University Australia and held on August 25th, 2014, in Melbourne. The venue was the Royal Society of Victoria, (8 La Trobe Street, Melbourne). The agenda is available here (pdf, 122kb)
International keynote: Pete Szabo
Senior malware researcher, Sophos Canada
A study of Malware's anti-analysis and anti-detection techniques
Pete talked about techniques malware authors use to make analysis and detection difficult using otherwise normal components. Real world examples, including banking malware and and the reverse engineering of a POS scraper.
- Jon Oliver, Trend Micro: "Malicious Viral Campaigns"
- Paul Black, PhishLabs: "Software similarity in banking malware"
- Silvio Cesare, Qualys: "Malware analysis automation"
- Dan Xu, Internet Commerce Security Laboratory: "What's in My Mobile Malware Analysis Toolbox"
- Sean Park, Kaspersky: "APT Penetration Testing Framework"
- Ian Welch, Victoria University of Wellington, "Empirical Analysis of the Impact of HTTP Referer upon Malicious Website Behaviour and Delivery"
- Robert Layton, Internet Commerce Security Laboratory: "Determining the provenance of binaries"
Topics include reverse engineering, behavioural analysis and attributing of malware, with talks focused on practice and implementations. Industry representatives from the financial sector, government agencies, security industry and academia are invited to attend.
Robert Layton, Research Fellow, Internet Commerce Security Laboratory, Federation University Australia.
Paul Black, Senior Threat Researcher, PhishLabs.
With thanks to Helen Wade, Administration Support Officer, Federation University Australia.
Registrations will cost $100, with a $50 discounted option for students (both undergraduate and postgraduate).
Registrations can be done through EventBrite at this page.
Another option to register is to download this form, fill it out, sign it and send to firstname.lastname@example.org
For security purposes, you can optionally encrypt the file with the following key and send to Robert Layton <email@example.com>, who will decrypt it and deliver to Finance.
Student ticket grant
We are also providing five tickets free of charge to eligible students. To apply for one, please send a paragraph of less than 250 words to firstname.lastname@example.org outlining:
- Your current project
- Your previous achievements in malware reverse engineering or related fields
- Your future goals
Tickets will be allocated to the top five entries, which will be ranked according to (1) quality of written proposal, and (2) relevance to malware reverse engineering. Please speak with your supervisor before submitting, as you may need to consider intellectual property issues before talking about your future goals.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1
-----END PGP PUBLIC KEY BLOCK-----