Annual Symposium on Information Assurance >> ASIA
Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu Facebook Twitter
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014

Billy Rios, Security Researcher, Google Inc.

Biography: Billy Rios is currently a security researcher for Google where he studies emerging security threats and technologies. Before Google, Billy was a Program Manager at Microsoft where he helped secure several high profile software projects including Internet Explorer. Prior to his roles at Google and Microsoft, Billy was a penetration tester, making his living by outsmarting security teams, bypassing security measures, and demonstrating the business risk of security exposures to executives and organizational decision makers. Before his life as a penetration tester, Billy worked as an Information Assurance Analyst for the Defense Information Systems Agency (DISA). While at DISA, Billy helped protect Department of Defense (DoD) information systems by performing network intrusion detection, vulnerability analysis, incident handling, and formal incident reporting on security related events involving DoD information systems. Before attacking and defending information systems, Billy was an active duty Officer in the United States Marine Corps. Billy has spoken at numerous security conferences including: Blackhat briefings, Bluehat, RSA and DEFCON. Billy holds a Bachelors degree in Business Administration, Master of Science degree in Information Systems, and a Master of Business Administration.

So You Wanna Be a Bot Master?
Abstract: Follow me as we explore the command and control software used by Bot Masters, analyze the tools used by the shadiest characters in the underground, and uncover data being stolen by bots from their unsuspecting victims. We'll dive into the source code and dissect the individual components of a real botnet command and control server. We'll also take a detailed look at what types of data the bots are after and how the bot gets the stolen data back to its master. All the software is real and all the data is genuine. You'll get to see the actual control consoles used by Bot Masters as they control an army of bots and learn to find these servers on the Internet.


Important Dates

I do not fear computers. I fear the lack of them.

- Isaac Asimov

Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.

- Fred Langa

In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it canít.

- M. Dacier