Select Language: English Russian

Russia & CIS Round 2014

Conference details

Dear Conference guests,

We are happy to invite you to join our Conference Russia&CIS Round live webcast on 20 - 21 February according to the Agenda.

You are welcome to join our Conference talks via Webex.

Please follow directions in the Manual.

Live webcast on 20th February

Date

Duration time

Topic

URL

Password

20.02.14

10:00 – 18:00

Conference ‘CyberSecurity for the Next Generation’

https://kaspersky.webex.com/kaspersky/k2/j.php?ED=295213217

KLconference

Live webcast on 21th February

Date

Duration time

Topic

URL

Password

21.02.14

10:00 – 16:30

Conference ‘CyberSecurity for the Next Generation’

https://kaspersky.webex.com/kaspersky/k2/j.php?ED=295220832

KLconference

In case of any questions, please contact us at  Academy@kaspersky.com

Agenda

Thursday, February 20, 2014
Time Event
10:00-10:45 Registration and Welcome Coffee
10:45-11:00 Welcome speech by Veniamin Ginodman, Head of Education Initiatives, Kaspersky Lab and Natalya Obelets, Deputy Head of Education Initiatives, Kaspersky Lab
11:00-11:30 Success Story or
11:30-12:30 Panel discussion - What Happened to the World of Cybersecurity after E. Snowden’s Revelations? Moderator - Sergey Novikov, Deputy Director, Global Research & Analysis Team, Kaspersky Lab
12:30-13:00 Coffee Break
13:00-13:15 Secure Cloud Computations Using Steganography, Philipp Burtyka, Computer Science Center of the Southern Federal University (presentation via Skype)
13:15-13:30 Sharing Private Encrypted Information in Online Social Networks, Sergey Shpak, National Research Nuclear University MEPhI
13:30-13:45 Using 3D Animated Hand Gestures to Create a New Type of CAPTCHA, Artem Shumilov, Bauman Moscow State Technical University
13:45-14:00 SSL Independent Client Server Secure Connection Based on Key Exchange Approach, Harutyun Terteryan, State Engineering University of Armenia
14:00-14:30 Visit to Anti-Malware Laboratory
14:30-15:30 Lunch at Cafetera Olympia park
15:30-15:45 Web Service Defense from DDoS via Provided Interface Controls, Tigran Tsaturyan, Bauman Moscow State Technical University
15:45-16:00 A Software Module of Flash Drive Protection from Unauthorized Access and Viruses, Stanislav Sarkisov, Pyatigorsk State Linguistic University
16:00-16:15 Secure Data Hiding in PDF Files Using Encrypted Secret Message, Anahit Arshakyan, State Engineering University of Armenia
16:15-16:30 Modeling of Botnet-Based DDoS Attacks Targeting Web Applications, Denis Murin, Kharkov National University of Radioelectronics
16:30-16:45 Secret Sharing System Based on Error-Correcting Codes, Sevak Harutyunyan, State Engineering University of Armenia
16:45-17:15 Coffee Break
17:15-18:15 CyberRing - team quiz with Sergey Novikov, Deputy Director, Global Research & Analysis Team, Kaspersky Lab
Friday, February 21, 2014
Time Event Location
9:30-10:00 Registration and Welcome Coffee
10:00-10:30 Using Winword and GoogleUpdate in a Cyberattack - presentation by Alexander Adamov, Lecturer at KhNURE, Malware Lab Team Leader at Lavasoft
10:30-10:45 Reading Device for Two-Factor Authentication, Ksenija Gnitko, Moscow Region State Educational Institution for higher professional education “Dubna International University for Nature, Society and Man”
10:45-11:00 Constructing a Security Threats Model for Cloud-Based Information Systems, Daria Simonenkova, National Research Nuclear University MEPhI
11:00-11:30 Coffe Break
11:30-11:45 A New Approach to Information Leak Prevention in Corporate Information Systems, Shushanik Torosyan, Moscow Region State Educational Institution for higher professional education “Dubna International University for Nature, Society and Man”
11:45-12:00 CloudChatcryptor System of Encryption and Secure Data Transfer, Vache Karapetyan, State Engineering University of Armenia
12:00-12:15 iCloud Traffic Control, Artur Ziarmand, Kharkov National University of Radioelectronics
12:15-12:30 Personal data protection in Social Networks, Koryakovtsev Alisher, Bauman Moscow State Technical University
12:30-13:30 Lunch at Cafetera Olympia park
13:30-15:30 Kaspersky Industrial Protection Simulation - team game with Vyacheslav Borilin, Business Development Manager, Kaspersky Lab
15:30-16:00 Coffe Break
16:00-16:30 Awards Ceremony

Finalists

 

Philipp Burtyka, Co-author Alina Trepacheva

Computer Science Center of South Federal University, Rostov-on-Don

Secure Cloud Computations Using Steganography

 

A new approach to organize the secure cloud computing is proposed. Its basic principle is to hide the fact of function evaluation over private data. Simple system illustrating this approach is considered. Comparison of this system with existing cryptographic primitives to protect data in clouds is carried out.

 

Tigran Tsaturyan

Bauman Moscow State Technical University, Moscow

Web Services Defense from DDoS via Provided Interfaces Controlling

 

 

Distributed Denial of Service (DDoS) attacks recently performed showed that the threat of overloading web service resources is still active. Nowadays, hackers prefer to use cleverer approach of loading not only the network, but higher levels via understanding service structure and hitting into most vulnerable places. This article is an outcome of, yet not completed, research, into CEP based system for analyzing user site queries and prevention from attacking to them. We build software that allows to measure and control server page loading and identify and limit fake visitors. Novel limiting approach is offered. We knowingly excluded any screenshots, code samples, specific design principles to focus on main features and benefits

 

Ksenija Gnitko

Moscow Region State Educational Institution for higher professional education “Dubna International University for Nature, Society and Man”, Dubna

Reading Device for Two-Factor Authentication

 

 

The author engineered reading device which is capable of solving problems of using biometrics as an inherence factor in two-factor authentication.

 

Daria Simonenkova

National Research Nuclear University «MEPhI», Moscow

Constructing Security Threats Model for Cloud-based Information Systems

 

 

Cloud computing technologies develop at prompt rates. Security requirements protection system should be defined and a security threats model for the cloud-based information systems should be constructed for this purpose. Unfortunately, it is not easy to find in literature the techniques of creating security threats model for cloud-based information systems.

 

Artur Ziarmand, Co-author Volodomir Miz

Kharkov National University of Radioelectronics

iCloud Traffic Control

 

 

An intellectual (smart) road infrastructure is proposed to monitor and control traffic in real-time through the use of global systems for positioning and navigation, mobile gadgets and the Internet in order to improve the quality and safety of vehicle movement, as well as for minimization the time and costs when vehicles are moved at the specified routes. The main innovative idea is transfer of traffic lights from the ground to a virtual cloud space for vehicle management, equipped with a mobile gadget, which displays on the screen map, route, coordinates of the road user and traffic signals. A set of innovative scientific and technological solutions for solving social, human, economic, fuel, energy and environmental problems associated with creation and use of a cloud for monitoring and management is developed. All of these technologies and tools are integrated into the system automaton model of real-time interaction between an infrastructure monitoring and control cloud and vehicle gadget

 

Shushanik Torosyan

Moscow Region State Educational Institution for higher professional education “Dubna International University for Nature, Society and Man”, Dubna

A New Approach on Information Leak Prevention in Corporate Information Systems

 

 

This paper is devoted to the solution of problem on information leak prevention in corporate information systems (CIS) that, in contrast to existing mechanisms for information monitoring realized in DLP-systems, provides primary automatic classification of incoming documents, certificate development for these documents saving document history, availability of confidential information and other data in these documents allowing control document flows without content examination and analysis. This work presents continuation of research on copyright protection mechanisms in document flow (Torosyan Sh., 2013) undertook by the author earlier.

 

Sergey Shpak

National Research Nuclear University «MEPhI», Moscow

Sharing Private Encrypted Information in Online Social Networks

 

 

Security in Online Social Networks (OSNs) is an issue, considering an ever-increasing number of OSNs community members and common anxiety about privacy. One of the most urgent challenges is designing secure and user-friendly message transmission in OSNs.
This paper investigates several techniques that may suggest solution to the topic, describes their advantages and disadvantages and analyzes the mechanism of secure message transmission in use implemented in VK Social Network.
A novel approach of secure message transmission in OSN is proposed, and an appropriate mechanism is designed for modern OSNs which is exemplified by showing a possibility of its implementation in VK Social Network, and some ways of the project future development are proposed

 

Vache Karapetyan

State Engineering University of Armenia. Yerevan

CloudChatcryptor System of Encryption and Secure Data Transfer

 

 

The system that we are presenting, can automatically encrypt, transfer and save the data in cloud.  It has two step verification which is making our data safer. The system is unique by its possibility of data encryption and decryption via only one code, without harming the security. And all these are done instantly

 

Denis Murin

Kharkov National University of Radioelectronics, Kharkov

Modelling of Botnet Based DDoS Attacks targeted to Web Applications

 

 

It is proposed a method for prediction of web application load increase and calculate system efficiency during given period of time with condition of Denial-of-Service attack possibility. It is developed a model of DDoS attacks caused by malicious self-speading software agents united into botnet. Numeric analysis of system protection with application of antivirus (antimalware) solutions is considered

 

Artem Shumilov

Bauman Moscow State Technical University, Moscow

Using 3D Animated Hand Gestures to Create a New Type of CAPTCHA

 

 

Website owners and administrators have to deal with the problem of spam every day. The intentions of spammers are to post advertisements, get access to private information, create links to improve search engine rankings of their own websites or something like that. In order to achieve those goals spammers have to send a lot of messages, so they usually use computer programs to do so. To protect their websites from spam webmasters use CAPTCHA – special tests created to tell computers and humans apart.
Although CAPTCHA does not guarantee absolute protection against spam, nevertheless, the use of sophisticated enough for automatic recognition CAPTCHA can stop spammers, as most programs of automatic recognition (spam bots) after one or more failed attempts to pass the test tries to find other sites with weaker spam protection.
This paper focuses on one of the most difficult for automatic recognition type of CAPTCHA using three-dimensional animated images hand gestures.

 

Anahit Arshakyan

State Engineering University of Armenia, Yerevan

Secure Data Hiding in PDF Files Using Encrypted Secret Message

 

 

A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document format files are used as data containers taking into account their wide spread use on Internet. A permutation cipher for providing original data security has been also applied.

 

Harutyun Terteryan, Co-author Michael Matveev

State Engineering University of Armenia, Yerevan

SSL Independent Client Server Secure Connection Based on Key Exchange Approach

 

 

This article studies a mechanism of securing connection between client and server, especially for the service-oriented applications. It points out the cases why using SSL is not enough to guarantee the application security and maintainability. The suggested mechanism is based on the asymmetric encryption algorithms and uses key exchange approach for establishing the secure session between client and server. Without using SSL the web service developer have to take care about the security mechanisms manually, but creating and implementing such a mechanism manually will take some time and efforts from developers. In order to avoid described issue, a reusable library has been created in the scope of the current research; the library can be used by the web service developers to secure web methods by simply adding one additional line in the code. Unlike other mechanisms the suggested one is also generic and can be configured for example to use different encryption algorithms, specific key lengths and other settings, preferred by the developers

 

Stanislav Sarkisov

Pyatigorsk State Linguistic University, Pyatigorsk

The Software Module of Flash Drives Protection from Unauthorized Access and Viruses

 

 

The project is directed at decreasing the risks of infecting flash-drives with viruses and lets minimize intrusion of autorun virsuses to FAT32 file systems, using incorrect names of local UNC-paths, checking file integrity and automatic filling of the whole space of a flash-drive with the capability of fast file saving on this flash-drive. The program also changes user rights in NTFS file systems, directly prohibiting saving at the root of a drive and works with Windows registry.

 

Alisher Koryakovtsev

Bauman Moscow State Technical University, Moscow

Personal Data Protection in Social Networks

 

 

The article can be considered as a summarization on all security concerns about Social Media networks that are accumulated over the years, and it is devoted to investigation of the privacy and security issues in Social Networks. In the first part of the article, issues of personal data collection, its inappropriate usage and Social Network security vulnerabilities are stated. In the second part of the work, one of the possible solutions is proposed and in this part author describes the design of this solution. Third part of the work describes applicable realization form that is a form of a web browser plug-in, which can guarantee open protection algorithms, higher security level for the personal data and simple system usage for everyone.

 

Sevak Harutyunyan, Co-author Artak Khemchyan

State Engineering University of Armenia, Yerevan

Secret Sharing System Based on Error-Correcting Codes

 

 

The new secret-sharing system, presented in the paper, runs on the error-correcting codes. The purpose of the research is high-performance system development, which will use different error-correcting codes

Winners

 

Artem Shumilov

Bauman Moscow State Technical University

The first prize goes to Artem Shumilov for "Using 3D Animated Hand Gestures to Create a New Type of CAPTCHA"

 

Sevak Harutyunyan

State Engineering University of Armenia

The second prize goes to Sevak Harutyunyan for "Secret Sharing System Based on Error-Correcting Codes"

 

Sergey Shpak

National Research Nuclear University «MEPhI»

The third prize goes to Sergey Shpak  for "Sharing Private Encrypted Information in Online Social Networks"

 

Artur Ziarmand

Kharkov National University of Radioelectronics

The best presentation prize goes to Artur Ziarmand

 

 

Shushanik Torosyan

Moscow Region State Educational Institution for higher professional education “Dubna International University for Nature, Society and Man”

The best presentation prize goes to Shushanik Torosyan

 

Sergey Shpak

National Research Nuclear University «MEPhI»

The best presentation prize goes to Sergey Shpak

Program committee

 

Sergey Novikov

Deputy Director, Global Research & Analysis Team, Kaspersky Lab

Sergey joined Kaspersky Lab in 2002 and was appointed Deputy Director of the company’s Global Research & Analysis Team in March 2013. Prior to becoming Deputy Director, Sergey was head of the company’s Global Research & Analysis Team in the EEMEA region. Sergey is responsible for managing the department’s operational activities in addition to organizing Kaspersky Lab’s annual Security Analyst Summit. Each year the summit brings the world’s best IT security experts together to collaborate and exchange research alongside international organizations, law enforcement agencies and technology companies. Sergey has a degree in Applied Mathematics from the Moscow State University of Railway Engineering and holds a postgraduate degree in IT Security. He is based in Moscow

 

 

Sergey Lozhkin

Senior Security Researcher, Kaspersky Lab

Sergey joined Kaspersky Lab in 2012. In his current role he conducts research in the following areas: cyber espionage, static and dynamic malware analysis, Undernet networks such as TOR, social engineering, secure data transfers, exploit analysis, anonymous networks, and cybercrime in general. Prior to joining Kaspersky Lab Sergey worked at several companies as a penetration test specialist and a virus analyst. He also investigated cybercrimes for the Russian Interior Ministry after graduating from the Omsk Academy of the Ministry of Internal Affairs

 

 

Vyacheslav Zakorzhevsky

Vulnerability Research Group Manager, Kaspersky Lab

Vyacheslav joined Kaspersky Lab in 2007 as a Virus Analyst. In 2013 he was appointed Head of Vulnerability Research. Now he leads a team of Malware Analysts and Researchers. Vyacheslav is mostly focused on 0-day vulnerabilities, exploits and polymorphic malware. He also manages the development of Patch Management and Vulnerability Assessment technologies.

Vyacheslav holds a Master’s degree from the Presidential Academy of the National Economy in Management in Financial Institutions and an MBA degree from the Swiss Business School in Global Finance and Banking

 

Dr. Stefano Ortolani

Education Initiatives Manager, Kaspersky Lab

Stefano Ortolani joined Kaspersky Lab in 2012 as a Security Researcher. Since then his responsibilities have included conducting scientific research in association with universities and governmental agencies. His research interests comprise intrusion detection, malware analysis, system security and communication privacy. Prior to joining Kaspersky Lab, Stefano worked as a Systems Security Researcher at Vrije Universiteit Amsterdam, The Netherlands from 2008. As a Ph.D. Candidate, he published a number of papers in international conference proceedings, as well as in international journals; he later earned his Ph.D. by successfully defending his dissertation titled "Keylogger Detection and Containment". Stefano also holds an MSc in Computer Science awarded summa cum laude from the Ca' Foscari University of Venice, Italy.

 

Vladimir Hahanov

Dean of Computer Engineering Faculty, Kharkov National University of Radio Electronics

Vladimir Hahanov is a Doctor of Science, he has 501 publications, 14 books and 3 patents.

Scientific work: creation of a computer-aided system for logic simulation; test generation; faults diagnosis in digital devices; systems and microprocessor-based structures; two-framed cubic Algebra; cubic forms of graph representation; cubic models of digital devices; deductive-parallel method of cubic fault simulation; topological deductive back traced parallel fault simulation method; cubic method of test generation; algebra logic fault localization and memory repair methods of SoC Functionality; Software tools (C++, Assembler, Fortran) for research; high performance fault simulation and test generation development for complete digital systems and networks described using hierarchical models; automated designs for testability within IEEE Boundary Scan standards and debugging tools for specialized microprocessor systems and digital system processes; brain-like computing for multiprocessors; smart cloud traffic control; quantum data structures and computation.V. Hahanov is chairman of the “IEEE East-West, IEEE Senior Member, IEEE Computer Society Golden Core Member,. Design and Test” international symposium and a member of 20 Program committees for International Conferences. He is Chief Scientist at Aldec Inc., and works in cooperation with Cadence, Microsoft, Intel, Kaspersky lab. He is also a scientific consultant of Echostar, USA.

 

Gevorg Margarov

Head of Information Security and Software Development Department, State Engineering University of Armenia (Polytechnic)

His current scientific interests include the Architecture of Computer Systems and Complexes, the Organization and Management of Information Security Systems, Digital Steganography, Applied Cryptography, E-learning and Knowledge Assessment Tools. Gevorg has over 180 scientific publications. He has supervised 9 theses for Candidate of Sciences (PhD) degrees in Armenia and a thesis for the degree of Doctor of Philosophy (PhD) in computer science in France.

Gevorg is a member of the Governing Board of the National Centre for Professional Education Quality Assurance Foundation (ANQA, Yerevan, Armenia), a professional member of the Association for Computing Machinery (ACM, New York, USA) and a member of the Computer Science Teachers Association (CSTA, New York, USA).

 

Mykola Graivoronskyi

Associate Professor at the Department of Information Security, Physics and Technology Institute, National Technical University of Ukraine

Mykola Graivoronskyi studied physics at the Moscow Institute for Physics and Technology and finished his PhD in 1992 after working on new techniques to investigate the structure of refractory metal alloys at the Frantsevich Institute for Problems of Materials Science in Kiev. After his academic work he accepted an offer to join the faculty at the newly created Physics and Technology Institute of National Technical University of Ukraine "Kiev Polytechnic Institute". He started teaching physics and electronics in 1996, but subsequently became more and more involved in teaching and practical work in the field of information security.

Since 2000 he has been involved in a number of projects, including the development of security systems for the IT systems of many Ukrainian organizations. He has also taken part in evaluating security systems, in certifying software and hardware security components according to the national standards of Ukraine, and in researching vulnerabilities in modern software.

 

Alexander Adamov

Lecturer in Kharkov National University of Radio Electronics Malware Lab Team Leader at Lavasoft

Expert

Alexander Adamov is a tutor at the Kharkov National University of Radio Electronics (KhNURE) with over eight years’ experience in the antivirus industry. He currently heads Lavasoft’s Malware Lab in Kharkov. Alexander holds an MSc degree in computer engineering from KhNURE and a MPh in Data Mining and Knowledge Discovery from the University of Wales. At present he is researching a PhD project related to cyberspace security and the automation of malware analysis. As a tutor he specializes in reverse engineering and malware analysis.

 

Sergey Golovanov

Principal Security Researcher, Kaspersky Lab

Expert

Sergey started his career at Kaspersky Lab in 2005, joining the company as a Virus Analyst before going on to become Head of the Non-Intel Research Group. He conducts research into data mining and threats that target online games and social networking sites, as well as the technologies and methods used by virus writers and cybercriminal groups. Sergey was appointed Malware Expert for the Russian Research Center in 2009 and is based in Moscow.

Sergey is currently a PhD student and in his spare time, teaches a course on securing computer networks. Prior to joining the Company, he worked at the Moscow Centre for Scientific and Technical Information.

 

Stepan Ilyin

Chief Operation Officer, Wallarm Inc

Stepan is well-known as former editor-in-chief of "Hacker" Magazine which is a widely acclaimed monthly publication for IT enthusiasts in Russia. He is author of more than 500 publications covering modern technologies and information security. At the beginning of 2014 Stepan joined Wallarm company which is specialized in developing solutions for web application security. Stepan has a degree in Computer Science from the Bauman Moscow State Technical University and holds a postgraduate degree in Business Administration. He is based in Moscow.

 

Location

2-1-A2 Tiksi Room, Olympia Park, Kaspersky Lab HQ, 39A/2 Leningradskoe Shosse, Moscow

 

Guest registration is open

Important Dates

Submissions Deadline: Friday 24th January 2014

Notification Deadline: Friday 31st January 2014

Russia & CIS Conference Brochure

Conference Broсhure

Your browser is out of date. It has known security flaws and may not display all features of this and other websites. Go here to update your browser.