The participants will take a role of a security researcher, who investigates the traffic of a malware captured in a sandbox (or other machine where full
packet capture is possible). Participants will learn basics about malware, what are their communication with command server, what are their monitization
schemes, and how the moduls and schemes can be inferred from the network traffic.
Structure: Exercises with laptops
Required Skills: No skills required, but basic knowlege about network protocols is a plus
Maximal number of participants: 20
Tomas Pevny holds the position of researcher at CTU in Prague and Technical lead with at Cisco systems, Inc. He has received his Ph.D. in CS from SUNY
in Binghamton at 2008 and MS in CS at CTU in Prague in 2003. In 2008-2009, he has spent one year in Gipsa-lab in Grenoble, France as a post-doc.
His reseach focuses on machine learning in security domains.