BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//37BGJD
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-MG7H3X@pretalx.com
DTSTART;TZID=CET:20260506T090000
DTEND;TZID=CET:20260506T180000
DESCRIPTION:Whether you are a Red Team or Blue Team specialist\, learning t
 he techniques and tricks of malware development gives you the most complet
 e picture of advanced attacks. Also\, due to the fact that most (classic) 
 malwares are written under Windows\, as a rule\, this gives you tangible k
 nowledge of developing under Windows.\n\nThe course will teach you how to 
 develop malware\, including classic tricks and tricks of modern ransomware
  found in the wild. Everything is supported by real examples.\n\nThe cours
 e is intended for Red Team specialists to learn in more detail the tricks 
 of malware development (also persistence and AV bypass) and will also be u
 seful to Blue Team specialists when conducting investigations and analyzin
 g malware.\n\nThe course is divided into four logical sections:\n- Malware
  development tricks and techniques (classic injection tricks\, DLL injecti
 on tricks\, shellcode running)\n- AV evasion tricks (Anti-VM\, Anti-Sandbo
 x\, Anti-disassembling)\n- Persistence techniques\n- Cryptographic functio
 ns in malware development (exclusive)\n- Malware Development for Android a
 nd Linux (bonus)\n\nMost of the example in this course require a deep unde
 rstanding of the Python\, Kotlin\nand C/C++ programming languages.\n\nKnow
 ledge of assembly language basics is not required but will be an advantage
DTSTAMP:20260412T011525Z
LOCATION:Workshops and Stage - Gernsback (C1.05.02)
SUMMARY:Malware Development for Ethical Hackers (Windows\, Linux\, Android)
  - cocomelonc
URL:https://pretalx.com/bsidesluxembourg-2026/talk/MG7H3X/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-Q7CEUD@pretalx.com
DTSTART;TZID=CET:20260507T090000
DTEND;TZID=CET:20260507T093500
DESCRIPTION:As AV/EDR systems evolve to detect behavioral anomalies\, offen
 sive tradecraft must adapt beyond static obfuscation. This talk explores t
 he convergence of Artificial Intelligence and advanced Cryptography in the
  development of next-generation evasive malware. We will move past traditi
 onal packing techniques to examine how lighweight LLMs and cryptographic p
 rimitives can be integrated directly into the malware lifecycle.\n\nYou wi
 ll gain insight into:\n- AI-Driven Polymorphism: Utilizing embedded or clo
 ud-based AI agents to dynamically rewrite logic and variable structures at
  runtime\, rendering signature-based detection obsolete.\n- Cryptographic 
 Context-Awareness: Implementing environmental keying and mathematical "log
 ic locking\," where payloads remain cryptographically sealed until specifi
 c environmental conditions (verified by AI logic) are met.\n- Entropy Redu
 ction: Techniques to make encrypted payloads statistically indistinguishab
 le from benign data or natural language using AI-generated steganography.\
 n\nThis talk bridges the gap between theoretical mathematics and practical
  weaponization\, demonstrating how free\, open-source AI models can be wea
 ponized for stealth\, and conversely\, how defenders can prepare for the a
 ge of "thinking" malware.
DTSTAMP:20260412T011525Z
LOCATION:IFEN room 2\, Workshops and AI Security Village  (Building D)
SUMMARY:AI and Cryptography for Evasive Malware - cocomelonc
URL:https://pretalx.com/bsidesluxembourg-2026/talk/Q7CEUD/
END:VEVENT
END:VCALENDAR
