June 6, 2007; 04:06 AM WHO: Dr. Jose Nazario, senior security and software engineer, Arbor Networks, Inc.
CONFERENCES: Computer Security Congress 2007 June 7-8, 2007 El Palacio de Miniera Mexico City, Mexico
Topic: State of the Net: The Malware Arms Race in 2007
Computer Security Institute NetSec 2007 Tuesday, June 12, 4:30 P.M. MDT The Phoenician Hotel Scottsdale, AZ
Topic: Reverse Engineering of Malicious Javascript
19th Annual FIRST Conference Monday, June 18, 9 A.M. CEST The Melia Seville Hotel Seville, Spain
Topic: Understanding and Analyzing Botnets
DESCRIPTIONS: State of the Net: The Malware Arms Race in 2007
Over the past few years the malware creation community has been "operationalizing" good offenses with great effect. In some cases, the turnaround from the research community has been a matter of days or hours. What's more, much of these tools and techniques are widely available. Malcode operators don't need to know how VMWare detection works to drop it into their code and gain its benefits.
In contrast, the good guys are busy building commercial products or research projects and trying to keep them out of competitors' hands. The effect of this is that the bad guys are multiplying faster than the good guys can keep up, more of them are hiding their samples from the hordes of medium skilled analysts better, and they're increasing the pressure to patch or defend. This is happening because they have access to malcode techniques and source and an intense drive to succeed.
Reverse Engineering of Malicious Javascript
Javascript has become a prominent vector for delivering a flood of Internet Explorer attacks in 2006, yet how to dissect these malicious websites is often a mystery. In this presentation, Dr. Nazario will demonstrate how researchers can disassemble obfuscated websites and protect their networks.
Understanding and Analyzing Botnets
Dr. Nazario will explore how botnet attacks on government agencies and corporations have increased in frequency and malice through various forms such as DDoS attacks, new malware outbreaks, and high volume scanning and exploit activity. His presentation will create a complete picture of the threats posed by botnets. Details will be provided on specialized tools and techniques that have been developed to infiltrate a large number of botnets for long periods of time.
About Arbor Networks
Arbor Networks delivers core-to-core network security and operational performance for global business networks. Arbor's Network Behavioral Analysis (NBA) solutions are based on the Arbor Peakflow platform, providing real-time views of network activity which enable organizations to instantly protect against worms, DDoS attacks, insider misuse, and traffic and routing instability, as well as to segment and harden networks from future threats. Today, Arbor Networks' customer base is comprised of a broad range of service provider and enterprise customers within a variety of industries spanning the globe, demonstrating the depth and breadth of the company's security expertise. All rely on the Arbor Peakflow platform to prevent costly downtime, enable network cleanup, and increase customer trust.
To learn more about Arbor Networks, please visit: http://www.arbornetworks.com. To learn more about the Arbor Security Engineering & Response Team (ASERT) -- the company's security research arm -- please visit the ASERT blog: http://asert.arbornetworks.com. To learn more about the Active Threat Level Analysis System (ATLAS) Initiative -- please visit http://atlas.arbornetworks.com
Note to Editors: Arbor Networks, Peakflow, ATLAS and the Arbor Networks logo are trademarks of Arbor Networks, Inc. All other brands may be the trademarks of their respective owners.
|