Internet Commerce Security Laboratory (ICSL)



Malware and Reverse Engineering Workshop (MRE-2016)

July 11-12, 2016
Melbourne - Engineers Australia, Innovation Hub Level 31, 600 Bourke Street, Melbourne, VIC 3000

Following the success of the previously held workshops in 2013, 2014 and 2015 workshop, we are pleased to announce that the Malware Reverse Engineering Workshop will be held in Melbourne on July, 2016.

MRE-2016 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing. The workshop aims to cover:

  • Reverse engineering methods, analyses and algorithms
  • Behavioural and attribution analysis of malware
  • Impacts into the financial sector and government agencies

Register for the MRE2016 workshop >>

Keynote speakers

Alex Tilley

Alex is the President of the Melbourne Chapter of the Grizzly bear catch and release project. He has yet to see, catch or release any Grizzly bears. But remains hopeful.

Presentation : "The new cool, why reverse engineering is so in demand"

Daniel Plohmann

Daniel Plohmann works as a senior analyst for Fraunhofer FKIE, taking apart malware families and botnet instances. His PhD research at University of Bonn focuses on automation and improving the efficiency of reverse engineering as an instrument for in-depth analysis. As a teaching assistant and thesis advisor for computer security related topics, he gives regular presentations and workshops on malware analysis and botnet infiltration. He also loves to put his experience to good use by supporting law enforcement as a subject matter expert.

Presentation : "The 3 Ghosts of Malware Reversing"

Free seminar

A free seminar by Daniel Plohmann will be held following the MRE-2016 workshop on Wednesday 13 July 2016 at Federation University Australia, Mt Helen Campus, Ballarat.

To register your interest in attending please advise Helen Wade,


Beenu Arora PwC Australia Cyber Threat Intelligence : Human Analytics
Paul Black PhishLabs Reversing Obfuscation
Scott Brown CERT Australia The Rules of Fight Club
Brian Candlish and Christian Teutenberg Telstra Active incident response
Jon Cooper FireEye/Mandiant Scoping the Incident
Matthew Dri Symantec Finding malware using MFT+USN and Elasticsearch
Chris Drake CryptoPhoto Malware Miscellany & Monetising
Daniel Eden and Brendan Kuang ANZ Bank  I can't get no sleep..
David LewisAustralian Signal Directorate (ASD)ASD war story #42; terminating hackers on the Department of Chickens
Kevin Manderson BAE Systems Known and Unknowns
Kayne Naughton Cosive Rough and Ready Malware Analysis
Jon Oliver Trend Micro  Deobfuscation of Macro Malware
Daniel Plohmann Fraunhofer FKIE A Field Report on Botnet Investigations
Carsten Rudolph Monash University Securing evidence in Malware analysis
Ian WelchVictoria University of WellingtonHands on SDN and BRO
Yang Xiang
Deakin University
Security and Privacy in Social Networks

Organising committee

Our organising committee is composed by security researchers and engineers from academia and industry.

Dr. Iqbal Gondal, Chair
Director, Internet Commerce Security Laboratory, Federation University Australia

Industry Track Organising Committee

Paul J. Watson
Cyber and Electronic Warfare Division, Defence Science and Technology Group

Paul Black
Senior Threat Researcher, PhishLabs

Shanna Daly

Silvio Cesare
Director of Anti-Malware Engineering, Qualys

Scott Brown
Senior Technical Adviser, CERT Australia

Ernest Foo
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology

Ian Welch

Senior Lecturer, School of Engineering and Computer Science, Victoria University of Wellington

Robert Layton
Director, dataPipeline

With special thanks to Helen Wade, Administration Support Officer, ICSL, Federation University Australia.


We welcome interest in sponsorship from the security industry and other partners. Please contact Dr Iqbal Gondal, Director ICSL if you are interested in discussing sponsorship opportunities.