Malware and Reverse Engineering Conference (MRE-2019)
1 and 2 July
We are pleased to announce that the Malware Reverse Engineering Conference will be held on the 1 and 2 July, 2019. Following the success of the previously held workshops in 2013, 2014, 2015, 2016, 2017 and 2018. 2019 promises to be bigger than ever.
MRE-2019 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing.
The conference aims to cover:
- Reverse engineering methods, analyses and algorithms
- Behavioural and attribution analysis of malware
- Impacts into the financial sector and government agencies
- Advanced monitoring schemes for Malware attacks
Registration for MRE-2019 is now open and you can purchase tickets at EventBrite
2019 program and keynote speakers
Planning has commenced for the 2019 Malware Reverse Engineering Conference. If you are interested in providing a presentation or would like information to be forwarded to you as soon as available, please advise Paul Black, firstname.lastname@example.org. Keep an eye on this page as information will be added as soon as available.
Professor Richard Brooks - Clemson University, USA
Richard is Professor of Electrical and Computer Engineering at Clemson University, South Carolina. His network security research projects have included funding from NSF (analysing wired and wireless denial of service vulnerabilities), DoE (authentication and authorisation of exa-scale storage systems), BMW Corporation (controlling dissemination of intellectual property), and the US State Department (creating anonymous communications tools for civil society groups). It frequently looks at attacks that disable security measures by working at a different level of the protocol stack. His Internet freedom work involves interactions with at risk populations working for freedom of expression.
Dr Jonathan Oliver - Trend Micro
Jonathan Oliver has been at Trend Micro for 13 years, his research has focused on a range of machine learning applications including ML for malware detection, the identification of ransomware outbreaks, BlackHole Exploit kit spam runs, and creating the antispam pattern. Prior to joining Trend Micro, Dr Oliver served as Chief Spam Fighter and Director of Research at Mailfrontier; and as a data mining consultant in the Silicon Valley for organisations such as NASA and the FAA. Jonathan Oliver holds a doctorate in information theoretic approaches to machine learning from Monash University, Melbourne. He holds more than 100 patents for technological designs.
Dr Tao Ban, NICT Japan
Dr. Tao Ban is a senior researcher with Cybersecurity Research Institute, National Institute of Information and Communications Technology, Tokyo, Japan.. He has published more than 50 Journal and Conference publications and book chapters in the field of Machine Learning, Data Mining, Multi variant analysis, Computer Graphics etc. He is on the executing editor of Journal of Intelligent Learning Systems and Applications. His research interest includes pattern classification, neural processing, machine learning and data mining for network security.
The current list of confirmed speakers for the MRE 2019 include:
|Tao Ban||NICT Japan||Current Practices and Recommendations at NICT to Mitigate Emerging Cyber Threats|
|Paul Black||ICSL||Extending The Malware Function Comparison Distance|
|Richard Brooks||Clemson University||Deception for Malware Discovery and Exploration|
|Matt Byrne||University of NSW||Hands Off Snakey - An Exploration of the Turla PNG Dropper|
|Shanna Daly||Caccia Cybersecurity||SRUM Forensics In Windows|
|Gyle dela Cruz||Using an Interdisciplinary Approach to Conceptualizing Threat Hunting|
|Adrian Herrera||Defence Science & Technology||Analyzing Trigger Based Malware with S2E|
|Daniel Hussey||Latrobe University, |
|Malicious Advertising Detection And Monitoring|
|Helen Jia||University of Technology|
|Stephen McCombie||Macquarie University||Interference in the 2016 US Election|
|Kunal Makwana||ISFB V3 In Au|
|Evita March||Federation University||Dispositional traits predicting online antisocial behaviour|
|Jonathan Milford||ACSC||Analysis of a custom post-exploitation framework|
|Jonathan Oliver||Trend Micro||On the Role of Machine Learning and AI in Security Solutions|
|Sean Park||Trend Micro||One-Shot Dynamic Detection of Malware Outbreaks|
|Gareth Parker||Defence Science & Technology||Next Generation Technology Research|
|Compromised compilers - A new perspective of supply chain cyber attacks|
Our organising committee is composed of security researchers and engineers from academia and industry.
- Iqbal Gondal, Chair - Director, Internet Commerce Security Laboratory, Federation University Australia
- Lorenzo Cavallaro - Chair in Cybersecurity, Security & Systems, King's College London
- Paul J. Watson - ASD, Defence Department
- Paul Black - PhD candidate, ICSL
- Scott Brown - Principal Advisor, Threat Analysis and Hunting, Rio Tinto
- Gabe Davis - Federal Agent, Cybercrime Operations, AFP Australia
- Daniel Rodriguez - Federal Agent, Cybercrime Operations, AFP Australia
- Christian Teutenberg - Threat Research and Intelligence, Security Operation, Telstra
There are plenty of opportunities for sponsorship support and we welcome interest in sponsorship from the security industry and other partners. Please contact Professor Iqbal Gondal, Director ICSL if you are interested in discussing sponsorship opportunities.