Malware and Reverse Engineering Conference (MRE-2019)
1 and 2 July
We are pleased to announce that the Malware Reverse Engineering Conference will be held on the 1 and 2 July, 2019. Following the success of the previously held workshops in 2013, 2014, 2015, 2016, 2017 and 2018. 2019 promises to be bigger than ever.
MRE-2019 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing.
The conference aims to cover:
- Reverse engineering methods, analyses and algorithms
- Behavioural and attribution analysis of malware
- Impacts into the financial sector and government agencies
- Advanced monitoring schemes for Malware attacks
Registration for MRE-2019 is now open and you can purchase tickets at EventBrite
2019 program and keynote speakers
Planning has commenced for the 2019 Malware Reverse Engineering Conference. If you are interested in providing a presentation or would like information to be forwarded to you as soon as available, please advise Paul Black, email@example.com. Keep an eye on this page as information will be added as soon as available.
Professor Richard Brooks - Clemson University, USA
Richard is Professor of Electrical and Computer Engineering at Clemson University, South Carolina. His network security research projects have included funding from NSF (analysing wired and wireless denial of service vulnerabilities), DoE (authentication and authorisation of exa-scale storage systems), BMW Corporation (controlling dissemination of intellectual property), and the US State Department (creating anonymous communications tools for civil society groups). It frequently looks at attacks that disable security measures by working at a different level of the protocol stack. His Internet freedom work involves interactions with at risk populations working for freedom of expression.
Assistant Professor Andrea Lanzi - The University of Milan, Italy
Andrea is an Assistant Professor at Universita` degli studi di Milano (The University of Milan) in the Computer Science Department, Italy where he is leading LaSER (Systems and Network Security lab). He is interested in several aspects of Cyber Security. In particular, his main area of research deals with Host Intrusion Detection Systems (HIDS), memory errors exploitation, reverse engineering, malware and forensic analysis. In recent years he has mainly studied the application of emulation/virtualisation and compiler techniques for malware analysis and detection in Android context. In addition he has been working on analysing large-scale security malware datasets to investigate the behaviour of current cyber threats.
Dr Tao Ban, NICT Japan
Dr. Tao Ban is a senior researcher with Cybersecurity Research Institute, National Institute of Information and Communications Technology, Tokyo, Japan.. He has published more than 50 Journal and Conference publications and book chapters in the field of Machine Learning, Data Mining, Multi variant analysis, Computer Graphics etc. He is on the executing editor of Journal of Intelligent Learning Systems and Applications. His research interest includes pattern classification, neural processing, machine learning and data mining for network security.
The current list of confirmed speakers for the MRE 2019 include:
|Paul Black||ICSL||Extending The Malware Function Comparison Distance|
|Richard Brooks||Clemson University||Deception for Malware Discovery and Exploration|
|Matt Byrne||University of NSW||Hands Off Snakey - An Exploration of the Turla PNG Dropper|
|Shanna Daly||Caccia Cybersecurity||SRUM Forensics In Windows|
|Adrian Herrera||Defence Science & Technology||Analyzing Trigger Based Malware with S2E|
|Daniel Hussey||Latrobe University, |
|Malicious Advertising Detection And Monitoring|
|Helen Jia||University of Technology|
|Stephen McCombie||Macquarie University||Interference in the 2016 US Election|
|Kunal Makwana||ISFB V3 In Au|
|Jon Oliver||Trend Micro|
|Sean Park||Trend Micro||One-Shot Dynamic Detection of Malware Outbreaks|
|Gareth Parker||Defence Science & Technology||Next Generation Technology Research|
|Compromised compilers - A new perspective of supply chain cyber attacks|
Our organising committee is composed of security researchers and engineers from academia and industry.
- Iqbal Gondal, Chair - Director, Internet Commerce Security Laboratory, Federation University Australia
- Lorenzo Cavallaro - Chair in Cybersecurity, Security & Systems, King's College London
- Paul J. Watson - ASD, Defence Department
- Paul Black - PhD candidate, ICSL
- Scott Brown - Principal Advisor, Threat Analysis and Hunting, Rio Tinto
- Gabe Davis - Federal Agent, Cybercrime Operations, AFP Australia
- Daniel Rodriguez - Federal Agent, Cybercrime Operations, AFP Australia
- Christian Teutenberg - Threat Research and Intelligence, Security Operation, Telstra
There are plenty of opportunities for sponsorship support and we welcome interest in sponsorship from the security industry and other partners. Please contact Professor Iqbal Gondal, Director ICSL if you are interested in discussing sponsorship opportunities.