Malware and Reverse Engineering Workshop (MRE-2016)
July 11-12, 2016
Melbourne - Engineers Australia, Innovation Hub Level 31, 600 Bourke Street, Melbourne, VIC 3000
Following the success of the previously held workshops in 2013, 2014 and 2015 workshop, we are pleased to announce that the Malware Reverse Engineering Workshop will be held in Melbourne on July, 2016.
MRE-2016 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing. The workshop aims to cover:
- Reverse engineering methods, analyses and algorithms
- Behavioural and attribution analysis of malware
- Impacts into the financial sector and government agencies
Alex is the President of the Melbourne Chapter of the Grizzly bear catch and release project. He has yet to see, catch or release any Grizzly bears. But remains hopeful.
Presentation : "The new cool, why reverse engineering is so in demand"
Daniel Plohmann works as a senior analyst for Fraunhofer FKIE, taking apart malware families and botnet instances. His PhD research at University of Bonn focuses on automation and improving the efficiency of reverse engineering as an instrument for in-depth analysis. As a teaching assistant and thesis advisor for computer security related topics, he gives regular presentations and workshops on malware analysis and botnet infiltration. He also loves to put his experience to good use by supporting law enforcement as a subject matter expert.
Presentation : "The 3 Ghosts of Malware Reversing"
A free seminar by Daniel Plohmann will be held following the MRE-2016 workshop on Wednesday 13 July 2016 at Federation University Australia, Mt Helen Campus, Ballarat.
To register your interest in attending please advise Helen Wade, firstname.lastname@example.org
|Beenu Arora||PwC Australia||Cyber Threat Intelligence : Human Analytics|
|Paul Black||PhishLabs||Reversing Obfuscation|
|Scott Brown||CERT Australia||The Rules of Fight Club|
|Brian Candlish and Christian Teutenberg||Telstra||Active incident response|
|Jon Cooper||FireEye/Mandiant||Scoping the Incident|
|Matthew Dri||Symantec||Finding malware using MFT+USN and Elasticsearch|
|Chris Drake||CryptoPhoto||Malware Miscellany & Monetising|
|Daniel Eden and Brendan Kuang||ANZ Bank||I can't get no sleep..|
|David Lewis||Australian Signal Directorate (ASD)||ASD war story #42; terminating hackers on the Department of Chickens|
|Kevin Manderson||BAE Systems||Known and Unknowns|
|Kayne Naughton||Cosive||Rough and Ready Malware Analysis|
|Jon Oliver||Trend Micro||Deobfuscation of Macro Malware|
|Daniel Plohmann||Fraunhofer FKIE||A Field Report on Botnet Investigations|
|Carsten Rudolph||Monash University||Securing evidence in Malware analysis|
|Ian Welch||Victoria University of Wellington||Hands on SDN and BRO|
|Security and Privacy in Social Networks|
Our organising committee is composed by security researchers and engineers from academia and industry.
Dr. Iqbal Gondal, Chair
Director, Internet Commerce Security Laboratory, Federation University Australia
Industry Track Organising Committee
Paul J. Watson
Cyber and Electronic Warfare Division, Defence Science and Technology Group
Senior Threat Researcher, PhishLabs
Director of Anti-Malware Engineering, Qualys
Senior Technical Adviser, CERT Australia
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Senior Lecturer, School of Engineering and Computer Science, Victoria University of Wellington
With special thanks to Helen Wade, Administration Support Officer, ICSL, Federation University Australia.
We welcome interest in sponsorship from the security industry and other partners. Please contact Dr Iqbal Gondal, Director ICSL if you are interested in discussing sponsorship opportunities.