The slide deck from a recent presentation at the AVAR conference summarizing ESET's comprehensive analysis of the Festi botnet.
The slide deck from a recent presentation at the Zero Nights conference analyzing the Flamer trojan in depth and examining its points of similarity to related malware (Stuxnet, Duqu, Gauss, Miniflame).
This is the slide deck used for a presentation at the Virus Bulletin 2012 conference in September. The paper it accompanies presents a technical and in-depth analysis of the most widely-used anti-forensic technique, hidden encrypted storage, used by complex threats that are currently in the wild.
A presentation for the REcon conference held in Montreal in 2012 describing the evolution and design of bootkits, and how they can be analyzed and countered.
A joint presentation for the CARO workshop in Munich by researchers from ESET, Group-IB, and TNK-BP, summarizing their analysis of the technical features and criminal activity of Win32/Carberp and related malware.
Recording of the keynote panel at the Infosecurity 2011 Fall Virtual Conference, at which David presented on "APTitude Adjustment" as well as participating in the subsequent discussion.
This presentation continues the authors' consideration of modern bootkit techniques for evading kernel mode code signing policy as applied to currently In-the-Wild malware
A presentation for the Ekoparty 2011 conference in Buenos Aires, looking in detail at the ways in which rootkit and bootkit authors try to evade kernel-mode code signing policy in 64-bit Windows versions
The presentation and speaker notes to accompany the paper presented at the EICAR 2011 conference. It contrasts existing malicious and legitimate technology and marketing, considering ways in which integration of security packages might mitigate the current wave of fake applications and services
A presentation for Confidence 2011, held in May 2011 in Krakow, on the analysis and implications of the latest generation of the TDL rootkit (TDL4).
An analysis of cybercrime threats, incidents, and issues in Russia presented at the CARO Workshop in Prague in May 2011.
The slide deck for a presentation delivered at Infosecurity Europe 2011, examining the Stuxnet phenomenon and what it holds for the future. Updated to include speaker notes.
The slide deck that accompanies the paper on Mac security presented by the authors at EICAR in May 2010.
A presentation on some of the problems with anti-malware testing and summarizing the mission and principles of the Anti-Malware Testing Standards Organization (AMTSO). Presented to the Special Interest Group in Software Testing of the BCS Chartered Institute for IT (formerly the British Computer Society).
This presentation accompanies the paper of the same name, which considers the practical, strategic and ethical issues that arise when the security industry augments its marketing role by taking civic responsibility for the education of the community as a whole. First presented at AVAR 2009 in Kyoto
This presentation by the Head of ESET's Virus Laboratory explores the complex legal problems generated by applications that can't be called out-and-out malware, but are nevertheless potentially unsafe or unwanted. Presented at the VB2009 conference in September 2009: the conference paper itself is available in "ESET Conference Papers" above, by kind permission of Virus Bulletin.