Malware and reverse engineering conference
Join our longest-running cybersecurity conference focused on the latest advances in threats, protection and response.
Attend the 2027 conference
The Malware and Reverse Engineering Conference is an annual event that has brought together people from industry, government, law enforcement and academia since 2013, to explore what’s happening in cybersecurity. Our focus is on practical work, applied research and collaborations.
Malware analysis and reverse engineering are key to understanding and responding to cyber threats. This conference is designed for cybersecurity professionals and researchers. You’ll hear from leading malware researchers, government speakers and prominent industry practitioners as they share what they’re working on and practical approaches to cybersecurity, threat prevention and response. Past speakers have come from organisations including Microsoft, IBM, Google, the Australian Cyber Security Centre and Triskele Labs.
Past speakers
Keynote speakers
- Richa Arora (IBM), AI security and autonomous threat operations
- Richard Grainger (Triskele Labs), Responding to ransomware in Australia: Are threat actors as sophisticated as they are made out To be?
- Mayur Kriplani (Google), Grounding the unknown: Neurosymbolic approaches to zero-day and polymorphic malware analysis
- Thomas Roccia (Microsoft), The state of malware analysis: How to stay relevant in the AI era
Speakers
- Chathura Abe (CYNQ), Threat informed assurance for critical infrastructure
- Neda Afzali (Victoria University), Reducing SOC analyst workload through AI-based narrative intelligence
- Riyaz Ahamed (University of Malaya), When malware crashes the DevOps party
- Raashid Bhat (Independent security professional), Malware binary detection: From trace to cimilarity
- Smita Jhajharia (RMIT) and Ajay Sharma (Check Point), Cybersecurity and the offensive misuse of AI
- Sanam Makadia (Datacom), Critical infrastructure security: Protecting the backbone of modern society
- Paul McCarty (OpenSourceMalware), From Npm to VSCode: Reversing engineering DPRK's contagious interview campaign
- Andrew McDonnell (Independent cybersecurity contractor), CVE waste? Come on a journey about finding and reporting exploits that nobody cares about
- Jonathan Oliver (Carbon Black and Broadcom), Working with fileless malware at scale
- Noushin Shabab (Kaspersky), HoneyMyte's new attacks targeting Asia, Africa, and Australia
- Sam Tseitkin (ExeQuantum), Quantum computers are coming, are you ready?
- Rue Maharaj (Melbourne Water), Silence of the LANs
- Martijn van Praag (Microsoft), Automatic deobfuscation of a complex malware
- Wei Shao (Data61), Adaptive cyber attacks in the era of AI: Lessons from adversarial reinforcement learning in SDN
- Abhay Vaish (Palo Alto Networks), Using AI to make cyber threat intelligence work
Keynote speakers
- Stefan Avgoustakis (Google), Beyond the buzz: Practical applications of AI/ML for scaling security
- Toby Murray (University of Melbourne), Cybersecurity research and education in the age of artificial intelligence
- Ejaz Ahmed (Data61), AI for software security: Ransomware behavioural analysis and detection
Speakers
- Bernard Colbert (Independent security professional), Assurance of responses to malware detection
- Katie Deakin Sharpe (ACSC), Reverse engineering sherlock holmes style: Obfuscated API's and the art of deduction
- Bayley Foster (FOSSEC), Creating and detecting malicious PCI devices
- Louay Ghashash (Spartans Sec), Incident eesponse: Insights from incidents and red team
- Praveen Gauravaram (TCS), Identity and access management for ICS/OT
- Muhammad Ikram (Macquarie University), Evaluating the resilience of malware detectors against obfuscation and adversarial attacks
- Anish Koshy (ANZ), Alert overload: How can machine learning help?
- Mayur Kriplani (Ernst & Young), Leveraging the power of LLMs coupled with ML to achieve proactive and inference based vulnerability management
- Rue Maharaj (Melbourne Water), Cybersecurity incident response management (a.k.a when the waste water hits the fan)
- Muhammad Ali Paracha (Transurban), Building resilience through incident response across domains
- Katherine Robins (Blanket Security), The future of cybersecurity
- Sabih Saeed (Microsoft), Autonomous cyber operations
- Ed Seaford (Brandsec), Threat hunting and enforcement: Evolving web-based phishing attacks
- Noushin Shabab (Kaspersky) and Armita Zarnegar (Swinburne University), A discussion of the challenges and opportunities of designing a malware analysis curriculum for undergraduate cybersecurity education
- Puneet Tikoo (Cisco), Simplifying threat modelling: Use DICE methodology and OWASP threat dragon to get started today
- Jason Tong (NAB), Deconstructing the droid
- Abhay Vaish (Palo Alto Networks) and Raashid Bhat (Independent researcher), Using LLMs to dissect and explain a malware sample's functionality
- Craig Wilson (Microsoft), Recent issues: Recovery and lessons learned
Keynote speakers
- Katherine Robins (IBM), Emerging technologies and the impact to malware and what we need to consider as security professionals
Speakers
- Chathura Abe (KPMG), Beyond binaries boundaries: A strategic approach with CTI and the power of malware reversing
- Kaif Ahsan (Atlassian), Olympic destroyer: A masterclass in misdirection
- Ejaz Ahmed (Data 61), Automated deobfuscation of windows API names from binaries
- Gavin Brown (Cyberbit), Cyber threats evolve: Shouldn't your cybersecurity skills
- Tarek Chaalan (Security Centric), AI under attack: Strategies to defend against cybersecurity attacks on machine learning and artificial intelligence
- Gyle dela Cruz (QBE), Threat hunting: Lets start at the very beginning
- Karl Denton (Malware Musings), Building a debugger from the ground up
- Jens Dietrich (Victoria University at Wellington, NZ), The limitations of software composition analysis
- Farhan Farooq (Amazon), Threat modelling for ransomware
- Tim Haintz (Microsoft), Work and study: A winning combination for personal and professional growth
- Youki Kadobayashi (NAIST Japan), Blending bleeds towards malware recognition engineering
- Mayur Kriplani (Ernst & Young), How vulnerability assessment is not the same as total vulnerability management
- Abbas Kudrati (Latrobe University), Midnight blizzard aka cozy bear: The nation threat actor to watch out for
- Kirk Nicholls (Korda Mentha), Win conditions: Designing and evaluating your security exercise campaign
- Jonathan Oliver (Carbon Black), The impact of masquerading files on reputation systems
- Sean Park (Trend Micro), Unveiling the enigma: Advanced strategies in malware reverse engineering
- Jarrel Rivera, Bridging the gap in cybersecurity education: In theory and practice
- Katherine Robins (IBM), Emerging technologies and the impact to malware and what we need to consider as security professionals
- Noushin Shabab (Kaspersky), TetrisPhantom: Long running espionage campaign targeting secure USBs
- Puneet Tikoo (Cisco), Beyond essential eight (E8) mitigation strategies
- Abhay Vaish and Raashid Bhat (Palo Alto Networks), Tofsee trojan: An in-depth analysis of a sophisticated modular malware and its campaigns
- Harris Wassylko and Chathura Abe (KPMG), Winning quickly with reversing
Keynote speakers
- Thomas Roccia (Microsoft), Binary instrumentation for malware analysis: Practical tools and techniques
- Chathura Abeydeera (KPMG), Keep calm and respond: An adversarial mindset approach to incident response.
- Matt Tett (Enex Test Lab), IoT security trust mark: Securing connected sevices: 15 years of lessons learned
Speakers
- Sharif Abuadbba (Data61), Malware field: Insights and trends from the top 4 security conferences
- Scott Ainslie (University of Melbourne), The use of traditional intelligence in cyber defence practices: A research agenda
- Tao Ban (NICT Japan), Research on IoT anti-malware technologies beyond CPU architectures
- Stephen Chey (IBM), Democratising cybersecurity skills
- Negar Shabab (Microsoft), Malicious browser extensions: How important they are, and how to analyse them
- Gyle Dela Cruz, Demystifying OSINT for a future SOC analyst
- Karl Denton (Cybermerc), Can we script it? Scripting malware analysis
- Priya Gnanasekaran (Lab3), Web3 security: Navigating the risks and rewards of the decentralised web
- Daisuke Inoue (NICT Japan Virtual), Cybersecurity activities in Japan for security IoT environment
- Joarder Kamruzzaman (Federation University), Robust malware detection using adversarial retraining
- Jemima Middis (Monash University online), The biggest bugs in the net: An assessment of ransomware attacks targeting Australian big business
- Jon Oliver (VmWare), Handling alert fatigue at scale using a combination of machine learning and fast search
- David Ormrod and Jamie Norton (McGrathNicol), Malware and threat intelligence economies and their impact on cybersecurity risks
- Sean Park (Trend Micro), A day of the adversary hunter
- Thomas Roccia (Microsoft), Binary instrumentation for malware analysis: Practical tools and techniques
- Matt Tett (Enex Test Lab), IoT security trust mark: Securing connected devices, 15 years of lessons learned
- Alex Rohl (University of Adelaide) and Chris Davey (University of Southern Queensland), Automated protocol reverse engineering using deep learning and heuristics
- Noushin Shabab (Kaspersky), Topic trooper: Targets high profile victims using newly discovered MQTT backdoor
- Paul Watters (Ionize), Industry-academic collaboration with an ICSL retrospective
- Yang Xiang (Swinburne University), Software vulnerability detection by fuzzing and deep learning
Keynote speakers
- Professor Richard Brooks (Clemson University), Deception for malware discovery and exploration
- Dr Jonathan Oliver (Trend Micro)
- Dr Tao Ban (NICT Japan), Current practices and recommendations at NICT to mitigate emerging cyber threats
Speakers
- Paul Black (Internet Commerce Security Laboratory), Extending the malware function comparison distance
- Matt Byrne (University of NSW), Hands off snakey: An exploration of the turla PNG dropper
- Shanna Daly (Caccia Cybersecurity), SRUM Forensics in windows
- Gyle dela Cruz, Using an interdisciplinary approach to conceptualizing threat hunting
- Adrian Herrera (Defence Science and Technology), Analyzing trigger based malware with S2E
- Daniel Hussey (Latrobe University and Federation University), Malicious advertising detection and monitoring
- Helen Jia (University of Technology) and Stephen McCombie (Macquarie University), Interference in the 2016 US election
- Kunal Makwana, ISFB V3 In Au
- Evita March (Federation University), Dispositional traits predicting online antisocial behaviour
- Jonathan Milford (ACSC), Analysis of a custom post-exploitation framework
- Jonathan Oliver (Trend Micro), On the role of machine learning and AI in security solutions
- Sean Park (Trend Micro), One-shot dynamic detection of malware outbreaks
- Gareth Parker (Defence Science and Technology), Next generation technology research
- Noushin Shabab (Kaspersky) and Negar Shabab (PS+C Group), Compromised compilers: A new perspective of supply chain cyber attacks
Keynote speakers
- Cory Cohen (Carnegie Mellon University), The pharos static analysis framework for malicious code analysis
- Lorenzo Cavallaro (University of London), Towards robust malware detection
- Lorenzo Cavallaro (University of London), Efficient version-agnostic automatic interface introspection for android
Speakers
- Matt Byrne (UNSW Canberra), Malware musings
- Federica Bisio and Daniella Traino (aizoOn), Advanced analytics on covert channel threats
- Sean Park (Trend Micro), Visual and generative malware outbreak detection using deep learning
- Noushin Shabab (Kaspersky), Supply-chain cyber attacks
- Meths Ferrer (Microsoft), Please call 1-800-Tech-Support-Scam for assistance
- Toby Murray (University of Melbourne), Formal proofs for secure software: Side-effects and the fine print
- Jonathan Oliver (Trend Micro), Discovering massive levels of signing abuse by large scale clustering
- Vitali Kremez (Flashpoint), Hidden nexus between necurs spammer and trickbot banker malware
- Ralf Huuck (Synopsys), Software swiss cheese or why we ship exploitable software
- Matt Ramsey (DST Group), Testing the usefulness of fuzzy hashing algorithms for malware similarity
- Alex Tilley (SecureWorks), Current online criminal threats to Australia
- Vaughan Shanks and Paul Black (Cydarm), Malware data management for fun & profit
- Stephen Tonkin (ACSC), Text search for malware analysts
Keynote speakers
Maciej Kotowicz (CERT.pl):
- Going for the goods: Crash course on rapid malware analysis
- Unpacking part 2: From craftsmanship to manufacturing
- The fence between your money and criminals
David Korczynski (University of Oxford):
- Advanced fine grained analysis of malware propagation with novel code injections
- Repeatable reverse engineering
- Abstract models of malware - how and why
Randy Stanger (National cyber-forensics and training alliance):
- Bare metal analysis and DarkWeb research
Speakers
- Noushin Shabab (Kaspersky), Analysis of an APT: A case study of targeted attacks on APAC countries
- Daniel Eden and Roshan Maskey (nightHawk), nightHawk response, the art of IR
- James Anderson (Defence Network Operations Centre), Symbolic of the future
- Paul Black (FireEye FLARE) ,Inline function identification
- Chun Feng (Microsoft), A technical analysis of SMB exploits
- Jon Oliver (Trend Micro), Locality sensitive hashing for identifying legitimate executable files
- Vincent Lo (CBA), Advanced web shell analysis
- Stephen McCombie (Secureworks), Russia state security cyber capability and operations
- Jason Tong and Aaron Fenwick (PWC), Defending the beachhead
- Craig Searle (Hivint), Data combat: Redux
- Alex Tilley (Secureworks), Current trends in cybercrime
Organising committee
Our organising committee brings together security researchers and engineers from both academia and industry.
- Associate Professor Paul Pang, Federation University
- Paul Black, Federation University
- Professor Joarder Kamruzzaman, Federation University
- Professor Iven Mareels, Federation University
- Emeritus Professor Syed Islam, Federation University
- Dr. Suryani Lim, Federation University
- Pooja Mishra, Federation University
- Dr Robert Layton, Eurekative
- Scott Mellis, Mastercard
- David Mulraney, The Repair Group
