-
1
-
-
78650062267
-
-
Symantec Security Response; Symantec: Mountain View, CA, USA
-
Falliere, N., Murchu, L.O., Chien, E. W32.Stuxnet Dossier; Symantec Security Response; Symantec: Mountain View, CA, USA, 2011.
-
(2011)
W32.Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
2
-
-
85019200739
-
-
(accessed on 1 November 2012).
-
Building a Cyber Secure Plant. Available online: http://www.totallyintegratedautomation.com/ 2010/09/building-a-cyber-secure-plant/ (accessed on 1 November 2012).
-
-
-
-
3
-
-
85019190026
-
-
Symantec: Mountain View, CA, USA, 2012, (accessed on 1 November 2012).
-
Symantec Security Response. W32.Flamer: Leveraging Microsoft Digital Certificates; Symantec: Mountain View, CA, USA, 2012. Available online: http://www.symantec.com/connect/blogs/ w32flamer-leveraging-microsoft-digital-certificates (accessed on 1 November 2012).
-
W32.Flamer: Leveraging Microsoft Digital Certificates
-
-
-
4
-
-
84892166017
-
-
Technical Report; Kapsersky Lab: Moscow, Russia
-
Kaspersky Lab. Gauss: Abnormal Distribution; Technical Report; Kapsersky Lab: Moscow, Russia, 2012.
-
(2012)
Gauss: Abnormal Distribution
-
-
-
5
-
-
84873617895
-
Duqu: Analysis, Detection, and Lessons Learned
-
Bern, Switzerland, 10 April
-
Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M. Duqu: Analysis, Detection, and Lessons Learned. In Proceedings of the ACM European Workshop on System Security (EuroSec), Bern, Switzerland, 10 April 2012.
-
(2012)
Proceedings of the ACM European Workshop on System Security (EuroSec)
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyházi, M.4
-
6
-
-
84876380168
-
-
Technical Report Version 1.0; Symantec: Mountain View, CA, USA
-
Symantec Security Response. W32.Duqu: The Precursor to the Next Stuxnet; Technical Report Version 1.0; Symantec: Mountain View, CA, USA, 2011.
-
(2011)
W32.Duqu: The Precursor to the Next Stuxnet
-
-
-
7
-
-
85019195293
-
-
Symantec: Mountain View, CA, USA, (accessed on 1 November 2012).
-
Symantec Security Response. Duqu Status Update #1; Symantec: Mountain View, CA, USA, 2011. Available online: http://www.symantec.com/connect/blogs/duqu-status-update-1 (accessed on 1 November 2012).
-
(2011)
Duqu Status Update #1
-
-
-
8
-
-
85019230644
-
-
Microsoft Security Bulletin MS11-087; Microsoft: Redmond, WA, USA, (accessed on 1 November 2012).
-
Microsoft Security TechCenter. Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417); Microsoft Security Bulletin MS11-087; Microsoft: Redmond, WA, USA, 2011. Available online: http://technet.microsoft.com/en-us/security/bulletin/ms11-087 (accessed on 1 November 2012).
-
(2011)
Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417)
-
-
-
9
-
-
85019255649
-
-
CrySyS Lab: Budapest, Hungary
-
Duqu Detector, version 1.24; CrySyS Lab: Budapest, Hungary, 2012.
-
(2012)
-
-
-
10
-
-
84880097156
-
-
Technical Report Version 0.93; CrySyS Lab: Budapest, Hungary
-
Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M. Duqu: A Stuxnet-Like Malware Found in the Wild; Technical Report Version 0.93; CrySyS Lab: Budapest, Hungary, 2011.
-
(2011)
Duqu: A Stuxnet-Like Malware Found in the Wild
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyházi, M.4
-
11
-
-
84876380168
-
-
Technical Report Version 1.4; Symantec: Mountain View, CA, USA
-
Symantec Security Response. W32.Duqu: The Precursor to the Next Stuxnet; Technical Report Version 1.4; Symantec: Mountain View, CA, USA, 2011.
-
(2011)
W32.Duqu: The Precursor to the Next Stuxnet
-
-
-
12
-
-
84874564710
-
-
Technical Report, Kaspersky Lab: Moscow, Russia
-
Gostev, A., Soumenkov, I. Stuxnet/Duqu: The Evolution of Drivers; Technical Report, Kaspersky Lab: Moscow, Russia, 2011.
-
(2011)
Stuxnet/Duqu: The Evolution of Drivers
-
-
Gostev, A.1
Soumenkov, I.2
-
13
-
-
84881131204
-
-
Technical Report Version 1.0; CrySyS Lab: Budapest, Hungary
-
sKyWIper Analysis Team. sKyWIper: A Complex Malware for Targeted Attacks; Technical Report Version 1.0; CrySyS Lab: Budapest, Hungary, 2012.
-
(2012)
sKyWIper: A Complex Malware for Targeted Attacks
-
-
-
14
-
-
85029371667
-
Flame: Bunny, Frog, Munch and BeetleJuice
-
(accessed on 1 November 2012).
-
Gostev, A. Flame: Bunny, Frog, Munch and BeetleJuice. Available online: http:// www.securelist.com/en/blog/208193538/Flame Bunny Frog Munch and BeetleJuice (accessed on 1 November 2012).
-
-
-
Gostev, A.1
-
15
-
-
84908489841
-
Analyzing the MD5 Collision in Flame
-
(accessed on 1 November 2012).
-
Sotirov, A. Analyzing the MD5 Collision in Flame. Available online: https://speakerdeck.com/ asotirov/analyzing-the-md5-collision-in-flame (accessed on 1 November 2012).
-
-
-
Sotirov, A.1
-
16
-
-
85019266460
-
Inside Flame: You Say Shell32, I Say MSSECMGR
-
(accessedon1November2012).
-
Santamarta, R. Inside Flame: You Say Shell32, I Say MSSECMGR. Available online: http://blog.ioactive.com/2012/06/inside-flame-you-say-shell32-i-say.html (accessed on 1 November 2012).
-
-
-
Santamarta, R.1
-
17
-
-
85019230412
-
QuickPost: Flame & Volatility
-
(accessed on 1 November 2012).
-
Ligh, M.H. QuickPost: Flame & Volatility. Available online: http://mnin.blogspot.hu/2012/06/ quickpost-flame-volatility.html (accessed on 1 November 2012).
-
-
-
Ligh, M.H.1
-
18
-
-
70350698232
-
MD5 considered harmful today-Creating a rogue CA certificate
-
Presented at 25th Chaos Communications Congress, Berlin, Germany, 30 December , (accessed on 1 November 2012).
-
Sotirov, A., Stevens, M., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B. MD5 considered harmful today-Creating a rogue CA certificate. Presented at 25th Chaos Communications Congress, Berlin, Germany, 30 December 2008. Available online: http://www. win.tue.nl/hashclash/rogue-ca/(accessed on 1 November 2012).
-
(2008)
-
-
Sotirov, A.1
Stevens, M.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
de Weger, B.7
-
19
-
-
85019224668
-
Technical Background on the Flame Collision Attack
-
News, 7 June, (accessed on 1 November 2012).
-
Stevens, M. Technical Background on the Flame Collision Attack. CWI (Centrum Wiskunde & Informatica) News, 7 June 2012. Available online: http://www.cwi.nl/news/2012/ cwi-cryptanalist-discovers-new-cryptographic-attack-variant-in-flame-spy-malware (accessed on 1 November 2012).
-
(2012)
CWI (Centrum Wiskunde & Informatica)
-
-
Stevens, M.1
-
20
-
-
85019235835
-
The Mystery of the Encrypted Gauss Payload
-
(accessed on 1 November 2012).
-
Kaspersky Lab. The Mystery of the Encrypted Gauss Payload. Available online: http://www. securelist.com/en/blog/208193781/The Mystery of the Encrypted Gauss Payload (accessed on 1 November 2012).
-
-
-
-
21
-
-
85019222432
-
-
CrySyS Lab: Budapest, Hungary
-
Gauss Info Collector, version 1; CrySyS Lab: Budapest, Hungary, 2012.
-
(2012)
-
-
-
22
-
-
70449623884
-
Towards reliable rootkit detection in live response
-
Stuttgart, Germany, 11-12 September
-
Freiling, F.C., Schwittay, B. Towards reliable rootkit detection in live response. In Proceedings of the International Conference on IT-Incidents Management and IT-Forensics (IMF), Stuttgart, Germany, 11-12 September 2007.
-
(2007)
Proceedings of the International Conference on IT-Incidents Management and IT-Forensics (IMF)
-
-
Freiling, F.C.1
Schwittay, B.2
-
23
-
-
84920873690
-
-
(accessed on 1 November 2012).
-
Russinowich, M., Cogswell, B. Process Monitor. Available online: http://technet.microsoft.com/ en-us/sysinternals/bb896645.aspx (accessed on 1 November 2012).
-
Process Monitor
-
-
Russinowich, M.1
Cogswell, B.2
-
24
-
-
84897418201
-
-
(accessed on 1 November 2012).
-
Russinowich, M. Process Explorer. Available online: http://technet.microsoft.com/en-us/ sysinternals/bb896653.aspx (accessed on 1 November 2012).
-
Process Explorer
-
-
Russinowich, M.1
-
25
-
-
85019173919
-
VMMap v3.11
-
(accessed on 1 November 2012).
-
Russinowich, M., Cogswell, B. VMMap v3.11. Available online: http://technet.microsoft.com/ en-us/sysinternals/dd535533.aspx (accessed on 1 November 2012).
-
-
-
Russinowich, M.1
Cogswell, B.2
-
26
-
-
85019249617
-
Virus:W32/Alman.B
-
(accessed on 1 November 2012).
-
Batler, J. Virus:W32/Alman.B. Available online: http://www.f-secure.com/v-descs/fu.shtml (accessed on 1 November 2012).
-
-
-
Batler, J.1
-
27
-
-
85019177373
-
-
(accessed on 1 November 2012)
-
XueTr Download Page. Available online: http://www.xuetr.com/download (accessed on 1 November 2012).
-
-
-
-
28
-
-
38149107454
-
-
Addison-Wesley Professional: Boston, MA, USA
-
Provos, N., Holz, T. Virtual Honeypots: From Botnet Tracking to Intrusion Detection; Addison-Wesley Professional: Boston, MA, USA, 2007.
-
(2007)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
-
-
Provos, N.1
Holz, T.2
-
29
-
-
33745434223
-
Detecting honeypots and other suspicious environments
-
West Point, NY, USA, 15-17 June
-
Holz, T., Raynal, F. Detecting honeypots and other suspicious environments. In Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop, West Point, NY, USA, 15-17 June 2005.
-
(2005)
Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop
-
-
Holz, T.1
Raynal, F.2
-
30
-
-
85019186019
-
-
Microsoft Security Bulletin MS12-034; Microsoft: Redmond, WA, USA, (accessed on 1 November 2012).
-
Microsoft Security TechCenter. Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578); Microsoft Security Bulletin MS12-034; Microsoft: Redmond, WA, USA, 2011. Available online: http://technet.microsoft.com/en-us/ security/bulletin/ms12-034 (accessed on 1 November 2012).
-
(2011)
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)
-
-
-
31
-
-
0003249402
-
Environmental key generation towards clueless agents
-
Vigna, G., Ed., Springer: Heidelberg, Germany
-
Riordan, J., Schneier, B. Environmental key generation towards clueless agents. In Mobile Agents and Security; Vigna, G., Ed., Springer: Heidelberg, Germany, 1999; pp. 15-24.
-
(1999)
Mobile Agents and Security
, pp. 15-24
-
-
Riordan, J.1
Schneier, B.2
|