BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//2026//E8WSCL
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-A7MFAX@cfp.nsec.io
DTSTART;TZID=EST:20260514T103000
DTEND;TZID=EST:20260514T110000
DESCRIPTION:Red teaming and penetration testing are core practices of the c
 yber security audit landscape. Both of these practices rely on the ability
  to execute offensive software tools that are normally detected as malicio
 us by antivirus software. To achieve the execution of these tools on syste
 ms where antivirus software are installed\, operators rely on several tech
 niques to evade detection. In practice\, detection evasion is\, too often\
 , ill-informed guesswork. A better methodology for evasion would allow for
  more efficient\, and therefore more affordable campaigns thus contributin
 g to more cyberresilient organisations. \n\nThis presentation will discuss
  some of my ongoing Ph.D. research into methodologies for deducing informa
 tion about detection capabilities present in antivirus software solutions.
  I propose a black-box approach based on software probes\, mutations and t
 he logical implications of their detection to identify antivirus capabilit
 ies. Correct identification of these capabilities would allow evasion tech
 niques to be applied intently and minimally\, reducing chances of unexpect
 ed detections and decreasing time spent on evading antivirus software.
DTSTAMP:20260507T203656Z
LOCATION:Salle de bal
SUMMARY:A systematic approach to evading antivirus software - Philippe Pép
 os Petitclerc
URL:https://cfp.nsec.io/2026/talk/A7MFAX/
END:VEVENT
END:VCALENDAR
