Skip to content

The 2023 Malware and Reverse Engineering (MRE) Conference

Home / News / The 2023 Malware and Reverse Engineering (MRE) Conference

The 2023 Malware and Reverse Engineering (MRE) Conference

twitterlinkedin

Following the easing of pandemic restrictions we are pleased to announce that the Malware & Reverse Engineering Conference will be held in 20-21 February, 2023. We will provide high quality speakers as in previous conferences in 2013, 2014, 2015, 2016, 2017,2018 and 2019 .

MRE-2023 is a bridge between industry, law enforcement and academia, with a strong focus on practical results from research and development projects in malware reversing.

The conference aims to broadly cover the following topics:

  • Threat intelligence
  • Incident response
  • Binary program analysis, and reverse engineering
  • Behavioural and attribution analysis of malware
  • Impacts into the financial sector and government agencies
  • Advanced monitoring schemes for malware attacks

The Venue

Microsoft,

Coffey Room Theatre,

Level 5 / 4 Freshwater Place,

Southbank,

Melbourne CBD

 

Invited Speakers and Topics

 

Name Organisation Topic
Chathura Abeydeera KPMG Keep Calm and Respond: An Adversarial Mindset Approach to Incident Response
Sharif Abuadbba Data61 Malware Field: Insights and Trends from the Top 4 Security Conferences
Tao Ban NICT Japan Research on IoT Anti-Malware Technologies Beyond CPU Architectures
Stephen Chey IBM Democratising Cybersecurity Skills
Shanna Daly & Kayne Naughton Cosive Reversing With Friends: Stay on Your Side of the Screen – Dammit
Gyle Dela Cruz Demystifying OSINT  for a Future SOC Analyst
Karl Denton Cybermerc Can we script it? Scripting Malware Analysis
Priya Gnanasekaran Lab3 Web3 Security: Navigating the Risks and Rewards of the Decentralised Web
Daisuke Inoue NICT Japan (Virtual) Cybersecurity Activities in Japan for Security IoT Environment
Joarder Kamruzzaman Federation University Robust Malware Detection Using Adversarial Retraining
Jemima Middis Monash University (NZ virtual) The Biggest Bugs in the Net – An Assessment of Ransomware Attacks Targeting Australian Big Business
Jon Oliver VmWare Handling Alert Fatigue at Scale using a Combination of Machine Learning and Fast Search
David Ormrod & Jamie Norton McGrathNicol Malware and Threat Intelligence Economies and their impact on cybersecurity risks
Sean Park Trend Micro A Day of the Adversary Hunter
Thomas Roccia Microsoft Binary Instrumentation for Malware Analysis: Practical Tools and Techniques
Matt Tett Enex Test Lab IoT Security Trust Mark – Securing Connected Devices – 15 Years of Lessons Learned
Alex Rohl & Chris Davey University of Adelaide & University of Southern Queensland Automated Protocol Reverse Engineering using Deep Learning and Heuristics
Noushin Shabab Kaspersky Topic Trooper – Targets High Profile Victims Using Newly Discovered MQTT Backdoor
Paul Watters Ionize Industry-Academic Collaboration with an ICSL Retrospective
Yang Xiang Swinburne Software Vulnerability Detection by Fuzzing and Deep Learning

 

Registration

Registration is available from Eventbrite

 Contact

This ICSL is committed to providing equal access and participation without regard to race, colour, religion, gender identity, among other things. If you would like to speak at the conference, please contact Dr. Paul Black.     

ICSL acknowledges the following key sponsors: Microsoft, Westpac, IBM, and the CSA-FedUni

You may be also interested in ...