i-code Final Conference
Location
The i-code final conference will be held on June 27 2012, in Brussels. The conference will be held at the Sheraton Brussels Airport hotel.
Registration
The i-code final conference is an open event. You are welcome to attend after registering - free of charge. For registering you should email the conference chair at stefano.zanero _at_ polimi.it and email subject "i-code final conference registration". The seats are limited and registrations will be handled on a first-come-first-serve basis.
Draft Programme
The conference consists of two sessions. The first session will focus on i-Code and the technologies we have used in it. In the second session members of the European digital forensics community will present their work. In-between (12:30-13:30) there will be a break and lunch will be offered to the attendees.
| 10.00-10.05 | Welcome and introduction Stefano Zanero, Politecnico di Milano (workshop chair) | |
| 10.05-10.30 | The i-Code forensic console: description and demonstration Alessandro Frossi, Politecnico Di Milano | Abstract & Bio |
| 10.30-10.50 | From Shellcode to Return-Oriented Programming: Detecting Malicious Code using Code Emulation Michalis Polychronakis, Columbia University | Abstract & Bio |
| 10.50-11.10 | Coffee Break | |
| 11.10-11.30 | Argos and its applications Remco Vermeulen, Vrije Universiteit Amsterdam | Abstract & Bio |
| 11.30-11.50 | AccessMiner: Using System-Centric Models for Malware Protection Davide Balzarotti, Institut Eurécom | Abstract & Bio |
| 11.50-12.10 | Anubis: Analyzing Unknown Binaries Martina Lindorfer, Vienna University of Technology | Abstract & Bio |
| 12.10-12.30 | Q&A on i-Code Stefano Zanero, Politecnico di Milano (workshop chair) |
| 13.30-14.00 | Digital forensics in the real world Erwin van Eijck, NFI | Abstract & Bio |
| 14.00-14.30 | HyperDbg: kernel debugging through hardware-assisted virtualization Aristide Fattori, Università degli Studi di Milano | Abstract & Bio |
| 14.30-15.00 | Recent advances in Suricata Victor Julien, Suricata | Abstract & Bio |
| 15.00-15.15 | Coffee Break | |
| 15.15-15.45 | HoneySpider Network 2.0: Detecting client-side threats the easy way Piotr Kijewski, NASK | Abstract & Bio |
| 15.45-16.15 | BANOMAD Julio Canto, VirusTotal.com | Abstract & Bio |
| 16.15-17.00 | Final discussion/roundtable |

With the support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.