|Join hundreds of other Developers and InfoSec professionals for Training, Sessions and Community at our first conference of 2019|
[AppSec Tel Aviv, May 26-30th]
Netherlands May 14, 2013
May 14, 2013
"In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services..."
- 18:30 - 19:15 Registration & Pizza
- 19:15 - 20:00
- 20:00 - 20:15 Break
- 20:15 - 21:00
- 21:00 - 21:30 Networking
Neutralizing Peer-to-Peer Botnets
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets. Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.
Discovering flaws using JS-Enabled crawlers
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.
Avans Hogeschool Room: OB007 Onderwijsboulevard 215 5223 DE 's-Hertogenbosch