-
2
-
-
58449115871
-
BitScope: Automatically dissecting malicious binaries
-
Technical Report CMU-CS-07-133. School of Computer Science, Carnegie Mellon University March
-
Brumley, D., Hartwig, C., Kang, M., Liang, Z., Newsome, J., Song, D., Yin, H. 2007. BitScope: Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133. School of Computer Science, Carnegie Mellon University (March).
-
(2007)
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.3
Liang, Z.4
Newsome, J.5
Song, D.6
Yin, H.7
-
3
-
-
78651531810
-
-
December
-
Federal Trade Commission. 2008. Court halts bogus computer scans (December); www.ftc.gov/ opa/2008/12/winsoftware.shtm.
-
(2008)
Court halts bogus computer scans
-
-
-
5
-
-
78651567823
-
-
Krebs, B. 2007. Internet Explorer unsafe for 284 days in 2006. Washington Post Online blog (January).
-
Krebs, B. 2007. Internet Explorer unsafe for 284 days in 2006. Washington Post Online blog (January).
-
-
-
-
6
-
-
78651577784
-
-
Krebs, B. 2009. Blogfight: IE vs. Firefox security. Washington Post Online blog (January).
-
Krebs, B. 2009. Blogfight: IE vs. Firefox security. Washington Post Online blog (January).
-
-
-
-
7
-
-
78651557177
-
-
Microsoft Security Advisory (935423). 2007. Vulnerability in Windows animated cursor handling; http://www.microsoft.com/TechNet/security/ advisory/935423.mspx.
-
Microsoft Security Advisory (935423). 2007. Vulnerability in Windows animated cursor handling; http://www.microsoft.com/TechNet/security/ advisory/935423.mspx.
-
-
-
-
12
-
-
80053650188
-
All your IFrames point to us
-
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F. 2008. All your IFrames point to us. Usenix Security Symposium: 1-16.
-
(2008)
Usenix Security Symposium
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
13
-
-
65949121003
-
Asprox silent defacement
-
December
-
Raz, R. 2008. Asprox silent defacement. Chapters in Web Security (December); http:// chaptersinWebsecurity.blogspot.com/ 2008/07/asprox-silent- defacement.html.
-
(2008)
Chapters in Web Security
-
-
Raz, R.1
-
14
-
-
78651523935
-
To catch a predator: A natural language approach for eliciting malicious payloads
-
Small, S., Mason, J., Monrose, F., Provos, N., Stubblefield, A. 2008. To catch a predator: A natural language approach for eliciting malicious payloads. Usenix Security Symposium: 171-184.
-
(2008)
Usenix Security Symposium
, pp. 171-184
-
-
Small, S.1
Mason, J.2
Monrose, F.3
Provos, N.4
Stubblefield, A.5
-
15
-
-
78651535219
-
Danmec/Asprox SQL injection attack tool analysis
-
May
-
Stewart, J. 2008. Danmec/Asprox SQL injection attack tool analysis. Secure Works Online (May); www. secureworks.com/research/threats/danmecasprox.
-
(2008)
Secure Works Online
-
-
Stewart, J.1
|