Malware and Reverse Engineering Conference 2024
Reverse engineers and malware researchers enjoyed high-quality speakers and networking at MRE 2023, and we are now preparing MRE 2024, which will be held on Monday and Tuesday, the 19th and 20th of February, 2024.
MRE-2024 is a bridge between industry, government and academia, with a strong focus on practical results from research and development projects in reverse engineering and malware research.
The conference aims to cover:
- Reverse engineering and compiled program analysis,
- Behavioral and attribution analysis of malware,
- Incident response,
- Impacts into critical infrastructure,
- Threat intelligence
Venue
Australian Computer Society,
Level 14, 839 Collins Street,
Docklands,
Melbourne.
Registration
Registration for MRE 2024 is now open and early bird tickets are available from Eventbrite.
2024 Program and Keynote Speakers
Katherine Robins - IBM
Katherine Robins leads the Cyber Security Services practice at IBM in Australia and New Zealand. She has a 25+ cyber security career driving architecture, design, delivery and innovation in cyber security across many industry sectors such as financial, government, automotive, mining, energy, etc. Katherine is a volunteer and mentor for women in STEM and a passionate supporter of diversity and inclusion.
Emerging technologies and the impact to malware and what we need to consider as security professionals
The keynote will link some of the emerging technologies and the security use cases for good and the use cases for bad and how we can adjust our skills and our responses to better enable better detection and response capabilities for the nefarious use cases and how we can lean in to using these technologies for good
Speakers
The confirmed speakers for MRE 2024 include:
Name | Organisation | Topic |
---|---|---|
Chathura Abe | KPMG |
Beyond
|
Kaif Ahsan | Atlassian | Olympic Destroyer, A Masterclass in Misdirection |
Ejaz Ahmed | Data 61 | Automated Deobfuscation of Windows API Names from Binaries |
Gavin Brown | Cyberbit | Cyber Threats Evolve - Shouldn't Your Cybersecurity Skills |
Tarek Chaalan | Security Centric / ICSL | AI Under Attack: Strategies to Defend Against Cybersecurity Attacks on Machine Learning and Artificial Intelligence |
Gyle dela Cruz | Threat Hunting - Lets Start at the Very Beginning | |
Karl Denton | Malware Musings | Building a Debugger From The Ground Up |
Jens Dietrich | Victoria University at Wellington (NZ) | The Limitations of Software Composition Analysis |
Farhan Farooq | Amazon | Threat Modelling for Ransomware |
Tim Haintz | Microsoft / ICSL | Work and Study: A Winning Combination for Personal and Professional Growth |
Youki Kadobayashi | NAIST Japan | Blending Bleeds towards Malware Recognition Engineering |
Mayur Kriplani | Ernst & Young | How Vulnerability Assessment is not the same as Total Vulnerability Management |
Abbas Kudrati | Latrobe University | Midnight Blizzard aka Cozy Bear- The nation threat actor to watch out for |
Kirk Nicholls | Korda Mentha | Win Conditions: Designing and Evaluating your Security Exercise Campaign |
Jonathan Oliver | Carbon Black | The Impact of Masquerading Files on Reputation Systems |
Sean Park | Trend Micro | Unveiling the Enigma: Advanced Strategies in Malware Reverse Engineering |
Jarrel Rivera | Bridging the Gap in Cybersecurity Education - In Theory and Practice | |
Katherine Robins | IBM | Emerging Technologies and the impact to malware and what we need to consider as security professionals |
Noushin Shabab | Kaspersky | TetrisPhantom: Long Running Espionage Campaign Targeting Secure USBs |
Puneet Tikoo | Cisco | Beyond Essential Eight (E8) Mitigation Strategies |
Abhay Vaish Raashid Bhat | Palo Alto Networks | Tofsee Trojan: An In-depth Analysis of a Sophisticated Modular Malware and its Campaigns |
Harris Wassylko / Chathura Abe | KPMG | Winning Quickly with Reversing |
2024 Organizing Committee
Our organizing committee is composed of security researchers and engineers from academia and industry.
- Paul Pang, Chair - Acting Director, ICSL Federation University,
- Paul Black - Post Doctoral Fellow - Cybersecurity, ICSL,
- Adam Bignold, Cybersecurity Lecturer - Federation University TAFE,
- Rekha Attanayake, Research Centre Support Officer, Research Services
- Joarder Kamruzzaman, Co-Director - Centre of Smart Analytics,
- Iven Mareels - Executive Dean - Institute of Innovation, Science and Sustainability,
- Syed Islam - Associate Deputy Vice-Chancellor (Research and Innovation),
- Pooja Mishra - Masters by research - Cybersecurity - ICSL,
- Chathura Abeydeera - Director - Cyber Security and Incident Response, KPMG.
Sponsors
The ICSL gratefully acknowledges the sponsorship provided by the Australian Computer Society (ACS) in making their Melbourne venue available for MRE 2024.