Sched.com Conference Mobile Apps
Botconf 2023
has ended
Create Your Own Event
Botconf 2023
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Co-authors
Sponsors
Search
or browse by date + venue
Botconf
Catering
All
Coffee
Lunch
Keynote talk
Long talk
Short talk
Social Event
Welcome
All
Coffee
Registration
Workshop
Popular
menu
Menu
Schedule
Speakers
Co-authors
Sponsors
Search
Popular Events
#1
WS3 - Using systematic code reuse analysis to create robust YARA rules
#2
WS2 - Malware forensics from a distance
#3
WS1 - One SMALI step for man, one giant step for researchers
#4
Welcome & Registration for Workshop attendees
#5
Lunch for Workshop attendees
#6
Workshop Coffee Break
#7
Welcome & Registration (Coffee)
#8
Opening Speeches
#9
Perfect Smoke and Mirrors of Enemy: Following Lazarus group by tracking DeathNote campaign.
#10
RAT as a Ransomware - An Hybrid Approach
#11
A dissection of the KmsdBot
#12
Lunch Break
#13
Security Implications of QUIC
#14
You OTA Know: Combating Malicious Android System Updaters
#15
Afternoon Coffee Break
#16
Digital threats against civil society in the rest of the world
#17
Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems?
#18
Syslogk Linux Kernel Rootkit - Executing Bots via “Magic Packets”
#19
Read The Manual Locker: A Private RaaS Provider
#20
The Fodcha Botnets We Watched
#21
Pizza and Beer Reception
#22
Welcome (Coffee)
#23
From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT
#24
Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users
#25
Ransom Cartel trying not to “REvil” its identity
#26
Morning Coffee Break
#27
Yara Studies: A Deep Dive into Scanning Performance
#28
MCRIT: The MinHash-based Code Relationship & Investigation Toolkit
#29
Lunch Break
#30
Operation drIBAN: insight from modern banking frauds behind Ramnit
#31
Catching the Big Phish: Earth Preta Targets Government, Educational, and Research Institutes Around the World
#32
The Case For Real Time Detection of Data Exchange Over the DNS Protocol
#33
Afternoon Coffee Break
#34
Tracking Bumblebee’s Development
#35
A student’s guide to free and open-source enterprise level malware analysis tooling
#36
Lightning Talks
#37
Gala Reception
#38
Welcome (Coffee)
#39
From Words to Intelligence: Leveraging the Cyber Operation Constraint Principle, Natural Language Understanding, and Association Rules for Cyber Threat Analysis
#40
Boss, our data is in Russia – a case-based study of employee criminal liability for cyberattacks
#41
Asylum Ambuscade: Crimeware or cyberespionage?
#42
Morning Coffee Break
#43
When a botnet cries: detecting botnets infection chains
#44
Tracking residential proxies (for fun and profit)
#45
Lunch Break
#46
Bohemian IcedID
#47
Life on a Crooked RedLine: Analyzing the Infamous InfoStealer's Backend
#48
The Plague of Advanced Bad Bots : Deconstructing the Malicious Bot Problem
#49
Closing Speech
Popular by Type
All Types
Botconf
Catering
Keynote talk
Long talk
Short talk
Social Event
Welcome
Workshop
Popular by Day
All days
Tuesday, Apr 11
Wednesday, Apr 12
Thursday, Apr 13
Friday, Apr 14