AVAR 2018
The Dynamic Security Ecosystem
Goa, India.
28th – 30th Nov 2018
Join the Top Security Minds in Asia-Pacific
SPEAKERS – AVAR 2018
Thank you for submitting your abstract for AVAR 2018. The abstract selection process is now complete
Theme : “The Dynamic Security Ecosystem’ .
The ecosystem of digital technology is in constant flux with an ever-growing set of devices and servers, communication channels, platforms, apps, etc., thus increasing the attack surface for cyber criminals. The security response to these challenges must evolve quickly and effectively to provide robust protection at the multifarious layers. At AVAR 2018 we’re seeking to explore the nature of these challenges and the countermeasures to tackle them.
PAPERS
* In alphabetical order by organization name

Jan Sirmer & Adolf Středa
AVAST Software
Botception: Botnet distributes script with bot capabilities

Nikolaos Chrysaidos
AVAST Software
Using APKLAB.IO Mobile Threat Intel platform to fight banking threats

Andreas Clementi & Peter Stelzhammer & Christoph Leitner & Philippe Rödlach
AV-Comparatives
Automated Real-World Testing of Mobile Security Solutions – Android and iOS

Dennis Batchelder & Hong Jia
AppEsteem
How to increase cybercrime: stop cooperating with each other

John Karlo D. Agon & Lovely Jovellee Lyn S. Bruiz
G Data
I’ll connect, Do you “mine”? Digging through the Techniques of Cryptomining Attack in a WiFi Network

Anoop Saldanha & Abhijit Mohanta
Juniper Threat Labs
Extending Binary Instrumentation To Automate Malware Reversing

Alexey Shulmin & Andrey Dolgushev
Kaspersky Lab
The EasternRoppels operation: PLATINUM group is back

Dmitry Tarakanov
Kaspersky Lab
Jump from Taiwan to Germany not standing up from a chair: how Winnti group spreads world-wide

Vladislav Stolyarov & Boris Larin
Kaspersky Lab
Catching multilayered zero-day attacks on MS Office

Anurag Shandilya & V.Dhanalakshmi
K7 Computing
Android SOS: The Urgent Need to Secure OS Settings

Kaarthik RM
K7 Computing
Fileless Fever: An in-depth Breakdown of Attacks from Poweliks to PowerGhost

Raja Babu A
K7 Computing
Deep-Mining Without a License: How Malicious Cryptominers Dig Across Platforms and Devices

Diwakar Kumar Dinkar & Prajwala Rao K
McAfee Labs
Fighting streaky macro threats: The saga continues

Dr. Zac Sadan & Rowland Yu
Protected Media & Sophos
The “harmless” $19Bn adware fraud scheme that’s eating your data plan, your battery life and stealing your privacy and personal data.

Alexey Vishnyakov
Security Code
The rules exist to violate them” or advanced methods of using classic NIDS

Jagadeesh Chandraiah
Sophos
Hide and Seek: An Investigation into changing dynamics of Android APT’s

Michael Jay Villanueva & John Kevin R. Sanchez
Trend Micro
One (S)hell of a Threat: Gateway to Other Platforms



















