Internet Commerce Security Laboratory (ICSL)

MRE2017

Malware and Reverse Engineering Conference (MRE-2017) : 3-4 July

Melbourne

Following the success of the previously held workshops in 2013, 2014, 2015 and 2016 , we are pleased to announce that the Malware Reverse Engineering Conference will be held in Melbourne in July (3-4th), 2017.

MRE-2017 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing. The conference aims to cover:

  • Reverse engineering methods, analyses and algorithms
  • Behavioural and attribution analysis of malware
  • Impacts into the financial sector and government agencies
  • Advanced monitoring schemes for Malware attacks

Venue

Conference will be held at Telstra Conference Centre, Level 1, 242 Exhibition Street, Melbourne (World's most livable city), VIC, 3000 Australia

Telstra Conference centre (TCC) is in the government (north-eastern) sector of the Melbourne central business district (CBD) the TCC enjoys convenient access to the local hotels (The Marriot and Rydges), theatres (Her Majesty's, The Princess and Comedy), restaurants (Chinatown, Lygon Street, Grossi Fiorentinis) and public transport (taxis, buses, trams and trains).

Parking: 150 Little Lonsdale St and 59 Lonsdale St plus on-street parking

Accommodation: Convenient access to The Marriott Hotel and Rydges Hotel

2017 program and keynote speakers

Planning has commenced for the 2017 Malware Reverse Engineering Conference. If you are interested in providing a presentation or would like information to be forwarded to you as soon as available, please advise Ms Kym Haymes, k.haymes@federation.edu.au. Keep an eye on this page as information will be added as soon as available.

Maciej Kotowicz, Principal Reverse Engineer at CERT.pl

Maciej has special interest in reverse engineering and exploit development as well as their automation. Occasional speaker. In his free time he like to drink beer and play CTFs, in no particular order.

David Korczynski, University of Oxford

David Korczynski is a researcher with the Department of Computer Science at University of Oxford. His research areas are malicious software, formal methods and program analysis. David likes to work in the intersection of theory and practice, which in this context means developing mathematical models of malicious software, and bridging these models to practical applications. His main tools of trade are process algebra communicating Sequential Processes, full system emulation environments, information-flow analysis and SMT-based reasoning.

Our organising committee is composed by security researchers and engineers from academia and industry.

Organising committee

Our organising committee is composed of security researchers and engineers from academia and industry.

  • Dr Iqbal Gondal, Chair - Director, Internet Commerce Security Laboratory, Federation University Australia
  • Paul J. Watson - Cyber and Electronic Warfare Division, Defence Science and Technology Group
  • Paul Black - Senior Threat Researcher, PhishLabs
  • Shanna Daly - FireEye
  • Scott Brown - Senior Technical Adviser, CERT Australia
  • Gabe Davis - Federal Agent, Cybercrime Operations, AFP Australia
  • Robert Layton - Director, dataPipeline
  • Christian Teutenberg - Threat Research and Intelligence, Security Operation, Telstra

Sponsorship

There are plenty of opportunities for sponsorship support and we welcome interest in sponsorship from the security industry and other partners. Please contact Dr Iqbal Gondal, Director ICSL if you are interested in discussing sponsorship opportunities.