Note: See Page No. 3 highlighted with \'Yellow\' color.
"Validy Technology" will be presented @ Krems, Austria between 11:15 - 11:45 hrs on 10 May, 2011 by Mr. Christophe Vedel, Validy Net Inc.
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
20th Eicar Annual Conference Program
1. 20th EICAR Annual Conference - Program
EICAR 20th Annual conference 2011
Program
SUNDAY May, 08th, 2011
16:00 17:00 Eicar Board Meeting
17:00 19:00 Eicar Members Meeting
Welcome Party
20:00 22:00 "Meet the Experts"
Page 1 of 3
2. MONDAY May, 09th, 2011
08:15 09:15 Registration + Welcome Coffee
09:15 09:30 Opening by the EICAR Chairman Rainer Fahs
CW in Perspective
AV/security technology, user, governments, law,
law enforcement, trust
09:30 10:15 Rainer Fahs
Future threats
10:15 11:00 Morton Swimmer
11:00 11:30 Coffee Break
Magic Lantern… reloaded
(Anti)Viral Psychosis McAfee Case
11:30 12:15 Eric Filiol
Presentation on legal issues
12:15 12:45 Prof. Nikolaus Forgo
12:45 14:00 Lunch Break
Presentation AV and Government
14:00 14:45 Ralf Benzmueller
Cyber Warfar from AV Perspective
14:45 15:30 Boris Sharov
CW impact on corporate security
15:30 16:15 Presentation from Krems
16:15 16:45 Coffee Break
Technical means for future cybercrime
16:45 17:30 Sebastien Tricaud
Panel session
moderated by Rainer Fahs
Gala Dinner at Kloster UND
Undstraße 6
20:00 22:30 3504 Krems/Stein
3. 20th EICAR Annual Conference - Program
TUESDAY May, 10th 2011
08:00 09:00 Coffee Break
09:00 09:45 Comparing Files Using Structural Entropy Best
Paper Award
Igor Sorokin (Dr Web)
Algorithmic Detection of Malware via Semantic
09:45 10:15 Signatures
Narendra Kumar N - Shyamasundar R - George
Sebastian - Saurav Yashaswee
10:15 10:45 Coffee Break
Android Malwares : is it a dream?
10:45 11:15
Anthony Desnos – Geoffroy Gueguen
Protection of computer software with a co-
11:15 11:45 processor token
Christophe Vedel
Malware spectral analysis:
11:45 12:15 security evaluation of Bayesian network
Eric Filiol & Sebastien Josse
A Graph Matching Algorithm for Binary Malware
Analysis via Normalized Compression Distance
12:15 13:00
between Functions
Renan Darcel, Robert Erra, Pierre Payet
13:00 14:30 Lunch
Security Software & Rogue Economics:
New Technology or New Marketing?
14:30 15:00 David Harley
Network based detection of malware activities
15:00 15:30 Pavel Minarik - Jitka Studenikova
15:30 16:00 Coffee Break
Maximizing cleaning rate for behavior based
16:00 16:30 detection, via CLOUD technologies
C. Lungu - L. Boeriu - S. Ciorceri - H. Coroiu -
Page 3 of 3