CARO Workshop 2015

CARO Workshop 2015

Search this site

General Information

  • 2015 CARO Workshop
  • Call for Lightning Talks
  • Call for Abstracts
  • Submission
  • Committees
  • Contact
  • Sitemap

Workshop

  • Programme
  • Presentations
  • Speakers
  • Lightning Talks

Attending

  • Registration
  • Accommodation
  • Social Activities
  • Venue and Local Information

Presentations

Presentations

  • 25 years of CARO - From the Good Old Times to Today's Cybercrime
  • Analyzing Sophisticated Android Malware with CodeInspect
  • Android Application Lifecycling: behaviorial analysis of Android Malware using force-directed graph
  • Bladerunner: Adventures in Tracking Botnets
  • Comparing the Incomparables
  • Coordinated Digital Judo
  • Core War 2.0: The DARPA CGC Challenge
  • CVE-2014-6332: A Tracking Adventure
  • Developing Vaccines for Ransomeware
  • Economic Pressure as an anti-malware tool
  • Eicar test file survey
  • Encouraging Coordinated Disclosures
  • Fighting Back the Judo Way: The Clean Software Alliance
  • Lightning Talks
  • Operation Seek and Destroy: Banker-Corkow
  • Shoot First, Ask Later: Experimenting with Brand Monitoring to Proactively Block Malicious Content
  • Taking Down Caphaw
  • The Circle Around Retefe
  • The possibilities and limits of fighting back: A pragmatic approach with TorrentLocker and Ebury
  • The Tao of .NET and Powershell Malware Analysis

Sign in|Recent Site Activity|Report Abuse|Print Page|Powered By Google Sites