Usr6 Posted January 1, 2014 Report Posted January 1, 2014 Botconf'13 - First botnet fighting conferenceInvited talk: Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnetsUlrich Seldeslachts Advanced Techniques in Modern Banking TrojansSpam and All Things Salty: Spambot v2013Distributed Malware Proxy NetworksLegal limits of proactive actions: Coreflood botnet exampleBack to life, back to correlationVasileios Friligkos Using cyber intelligence to detect and localize botnetsZombies in your browserSpatial Statistics as a Metric for Detecting Botnet C2 ServersThe Home and CDorked campaigns : Widespread Malicious Modification of Webservers for Mass Malware DistributionMalware CallingDisassEfficient Program Exploration by Input FuzzingThe power of a team work – Management of Dissecting a Fast Flux Botnet, OP-Kelihos “Unleashed”Hendrik Adrian and Dhia Mahjoub Blog post Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environmentParticipatory Honeypots: A Paradigm Shift in the Fight Against Mobile BotnetsMy Name is Hunter, Ponmocup HunterReputation-based Life-course Trajectories of Illicit Forum MembersAPT1: Technical BackstageInvited talk: Europol and European law enforcement action against botnetsA General-purpose Laboratory for Large-scale Botnet ExperimentsDNS Resolution Traffic Analysis Applied to Bot DetectionExploit Krawler: New Weapon againt Exploits KitsBladeRunner: Adventures in Tracking BotnetsThe hunter becomes the hunted – analyzing network traffic to track down botnetsDownload : https://www.botconf.eu/index.php/schedule/p.s. La Multi Ani!. Quote