Tuesday — October 16th, 2007 09:40
A technical overview of the various malicious bot families and how they work, including source code, disassembly analysis and how they attack new systems. Attendees will leave with a thorough understanding of common bot internals, ability to spot them and stop them. Programming and TCP/IP knowledge not required but helpful.
Jose Nazario (Arbor Networks, US) 

Dr. Jose Nazario is a Senior Security Researcher with the ASERT Team at Arbor Networks. In this capacity, he is responsible for analyzing burgeoning Internet security threats, reverse engineering malicious code, software development, developing security mechanisms that are then distributed to Arbor's Peakflow platforms via the Active Threat Feed (ATF) threat detection service.
Dr. Nazario's research interests include large-scale Internet trends such as reachability and topology measurement, Internet-scale events such as DDoS attacks, botnets and worms, source code analysis tools, and data mining. He is the author of the books "Defense and Detection Strategies against Internet Worms" and "Secure Architectures with OpenBSD." He earned a Ph.D. in biochemistry from Case Western Reserve University in 2002. Prior to joining Arbor Networks, he was an independent security consultant. Dr. Nazario regularly speaks at conferences worldwide, with past presentations at CanSecWest, PacSec, Blackhat, and NANOG. He also maintains WormBlog.com, a site devoted to studying worm detection and defense research.