usenix conference policies
Live Malware Attack!
If you are interested in the source code of tools used during the demo, please email conference@usenix.org for more information.
Pretty much everyone
knows that there is a lot of hostile code out there. But how does a
malware attack unfold? How do exploits work in real life? How easily
might you be phished? More important, how do you deliberately go about
watching malware at work (in both senses of "at work"), especially if it
is malware that relies on the Internet to function?
This talk will
feature a live—but entirely self-contained, and therefore
safe!—demonstration of a modern malware attack in action. Gain insight
into how the bad guys think and operate, and you learn how better to
defend yourself against them.
The talk will also
examine some of the tricks and techniques that can be used in a malware
research lab to get even an apparently complex and heavily obfuscated
piece of malware to reveal its secrets in safety.
Paul Ducklin works
for Sophos in Australia, where he does assorted security stuff. He is
Head of Technology, Asia Pacific. If you find out what this means,
please attend his talk so that you can tell him.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Paul Ducklin},
title = {Live Malware Attack!},
year = {2007},
address = {Santa Clara, CA},
publisher = {USENIX Association},
month = jun
}
connect with us