-
1
-
-
84855859636
-
Evidence of advanced persistent threat: A case study of malware for political espionage
-
IEEE
-
F. Li, A. Lai, and D. Ddl, "Evidence of Advanced Persistent Threat: A Case Study of Malware for Political Espionage," 6th Int'l Conf. Malicious and Unwanted Software (Malware 11), IEEE, 2011, pp. 102-109.
-
(2011)
6th Int'l Conf. Malicious and Unwanted Software (Malware 11)
, pp. 102-109
-
-
Li, F.1
Lai, A.2
Ddl, D.3
-
2
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
ACM
-
M. Cova, C. Kruegel, and G. Vigna, "Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code," Proc. 19th Int'l Conf. World Wide Web, ACM, 2012; http://doi.acm.org/10.1145/1772690.1772720.
-
(2012)
Proc. 19th Int'l Conf. World Wide Web
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
3
-
-
84873344067
-
Browser exploit packs - Death by bundled exploits
-
A.K Sood and R.J. Enbody, "Browser Exploit Packs - Death by Bundled Exploits," Proc. 21st Virus Bulletin Conf., 2011; http://secniche.blogspot. com/2011/10/virus-bulletin-2011-conference-browser.html.
-
(2011)
Proc. 21st Virus Bulletin Conf.
-
-
Sood, A.K.1
Enbody, R.J.2
-
4
-
-
84873342212
-
Into the darkness: Dissecting targeted attacks
-
Nov.
-
R. Branco, "Into the Darkness: Dissecting Targeted Attacks," Qualys Blog, Nov. 2011; https://community.qualys.com/blogs/securitylabs/2011/11/ 30/dissecting-targeted-attacks.
-
(2011)
Qualys Blog
-
-
Branco, R.1
-
5
-
-
84863590115
-
A security analysis of amazon's elastic compute cloud service
-
ACM
-
M. Balduzzi et al., "A Security Analysis of Amazon's Elastic Compute Cloud Service," Proc. 27th Ann. ACM Symp. Applied Computing, ACM, 2012; http://doi.acm.org/10.1145/2245276.2232005.
-
(2012)
Proc. 27th Ann. ACM Symp. Applied Computing
-
-
Balduzzi, M.1
-
7
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
IEEE
-
H. Binsallee et al., "On the Analysis of the Zeus Botnet Crimeware Toolkit," IEEE 8th Ann. Conf. Privacy, Security and Trust (PST), IEEE, 2010; http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber= 5593240&isnumber=5593224.
-
(2010)
IEEE 8th Ann. Conf. Privacy, Security and Trust (PST)
-
-
Binsallee, H.1
-
9
-
-
84927922719
-
Achieving cyber survivability in a contested environment using a cyber moving target
-
May
-
H. Okhravi, J.W. Haines, and K. Ingols, "Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target," High Frontier: The Journal for Space and Cyberspace Professionals, May 2011; http://web.mit.edu/ha22286/www/papers/journal/Achieving-Cyber-Survivability-in- a-Contested-Environment-Using-a-Cyber-Moving-Target.pdf.
-
(2011)
High Frontier: The Journal for Space and Cyberspace Professionals
-
-
Okhravi, H.1
Haines, J.W.2
Ingols, K.3
-
10
-
-
84873340257
-
-
School of Public Policy, Univ. of Maryland, Mar.
-
N. Christin, "On Critical Infrastructure Protection and International Agreements," School of Public Policy, Univ. of Maryland, Mar. 2011; www.cissm.umd.edu/papers/files/on-critical-infrastructure-protection-and- international-agreements-033111-final.pdf.
-
(2011)
On Critical Infrastructure Protection and International Agreements
-
-
Christin, N.1
-
11
-
-
84873338401
-
Mass meshing injection: Sidename.js (now cssminibar.js) ongoing
-
15 June
-
W. Huang, C. Hsiao, and N. Lin, "Mass Meshing Injection: Sidename.js (now cssminibar.js) Ongoing," Armorize Malware Blog, 15 June 2011; http://blog.armorize.com/2011/06/mass-meshing-injection-sidenamejs.html.
-
(2011)
Armorize Malware Blog
-
-
Huang, W.1
Hsiao, C.2
Lin, N.3
-
12
-
-
84873338401
-
Malvertising on google doubleclick ongoing
-
25 Aug.
-
W. Huang, C. Hsiao, and N. Lin, "Malvertising on Google Doubleclick Ongoing," Armorize Malware Blog, 25 Aug. 2011; http://blog.armorize.com/ 2011/08/malvertisingon-google-doubleclick.html.
-
(2011)
Armorize Malware Blog
-
-
Huang, W.1
Hsiao, C.2
Lin, N.3
-
13
-
-
84873371573
-
Exploiting smart-phone USB connectivity for fun and profit
-
A. Stavrou and Z. Wang, "Exploiting Smart-Phone USB Connectivity for Fun and Profit," BlackHat DC Conf., 2011; https://media.blackhat.com/bh- dc-11/Stavrou-Wang/BlackHat-DC-2011-Stavrou-Zhaohui-USB-exploits-wp.pdf.
-
(2011)
BlackHat DC Conf.
-
-
Stavrou, A.1
Wang, Z.2
-
14
-
-
84873338158
-
Thoughts about trusted computing
-
J. Rutkowska, "Thoughts about Trusted Computing," EuSecWest Conf., 2009; http://invisiblethingslab.com/resources/misc09/trusted-computing- thoughts.pdf.
-
(2009)
EuSecWest Conf.
-
-
Rutkowska, J.1
|