-
1
-
-
84896307818
-
Encryption: Practice
-
(alias), 29A Ezine online, 14 Aug 2005
-
Blade Runner (alias) (1996) "Encryption: Practice", [online], 29A Ezine, Vol. 1.2_2. http://www.madchat.org/vxdevl/vxmags/29a-1/29A%231.2_2. [14 Aug 2005].
-
(1996)
, vol.1-2
-
-
Runner, B.1
-
2
-
-
0004046658
-
A Taxonomy of Obfuscating Transformations
-
Department of Computer Science, University of Auckland, 1997
-
Collberg, C., Thomborson, C., and Low, D. (1997) "A Taxonomy of Obfuscating Transformations." Department of Computer Science, University of Auckland, 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
3
-
-
84896278892
-
Hide 'n' Seek? Anatomy of Stealth Malware
-
online, 2003, 4 Sep 2005
-
Erdelyi, G. (2003) "Hide 'n' Seek? Anatomy of Stealth Malware", [online], Virus Bulletin, 2003. http://www.google.com/url?sa=t&ct=res&cd=1&url=http%3A//www.blackhat.com/presentations/bh-europe-04/bh-eu-04-erdelyi/bh-eu-04-erdelyi-paper.pdf&ei=kowdQ7OaN8L8iQHW08mKCw [4 Sep 2005].
-
(2003)
Virus Bulletin
-
-
Erdelyi, G.1
-
4
-
-
78651564650
-
F-Secure virus descriptions
-
F-Secure, online, 15 Nov 2005
-
F-Secure (2005) "F-Secure virus descriptions", [online], http://www.f-secure.com/v-descs/. [15 Nov 2005].
-
(2005)
-
-
-
5
-
-
84896288009
-
Gollum Virus
-
(alias), 29A Ezine, online, 21 Aug 2005
-
GriYo (alias) (1997) "Gollum Virus", [online], 29A Ezine, Vol. 2.3_A. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_A. [21 Aug 2005].
-
(1997)
, vol.2-3 A
-
-
GriYo1
-
6
-
-
84896277920
-
Win32.Cabanas.2999
-
(alias), 29A Ezine, online, 14 Aug 2005
-
Jack Qwerty (alias) (1997a) "Win32.Cabanas.2999", [online], 29A Ezine, Vol. 2.3_6. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_6. [14 Aug 2005].
-
(1997)
, vol.2-3
-
-
Qwerty, J.1
-
7
-
-
84896264697
-
Win32.Jacky.1440
-
(alias), online, 29A Ezine, 21 Aug 2005
-
Jack Qwerty (alias) (1997b) "Win32.Jacky.1440", [online], 29A Ezine, Vol. 2.3_7. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_7. [21 Aug 2005].
-
(1997)
, vol.2-3
-
-
Qwerty, J.1
-
8
-
-
84896304300
-
Hide 'N Seek Revisited - Full Stealth is Back
-
Virus Bulletin Conference. October 2005
-
Kasslin, K., Stahlberg, M., Larvala, S. and Tikkanen, A. (2005) "Hide 'N Seek Revisited - Full Stealth is Back", Virus Bulletin Conference. October 2005.
-
(2005)
-
-
Kasslin, K.1
Stahlberg, M.2
Larvala, S.3
Tikkanen, A.4
-
9
-
-
84896262752
-
Analysis on the Decryptor Generation
-
(alias),29A Ezine online, 21 Aug 2005
-
Lord Julus (alias) (1997) "Analysis on the Decryptor Generation", [online], 29A Ezine, Vol. 2.2_9. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.2_9. [21 Aug 2005].
-
(1997)
, vol.2
-
-
Julus, L.1
-
10
-
-
84896288501
-
Win32 Bait Detection
-
SnakeByte, (alias), online, 14 Nov 2005
-
SnakeByte (alias) (2004) "Win32 Bait Detection", [online], http://madchat.org/vxdevl/papers/vxers/SnakeByte/w32bd.txt. [14 Nov 2005].
-
(2004)
-
-
-
11
-
-
84896300104
-
ELVIRA virus
-
Spanksa, alias, online, 29A Ezine, 28 Aug 2005
-
Spanksa (alias) (1997) "ELVIRA virus", [online], 29A Ezine, Vol. 2.4_B. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.4_B [28 Aug 2005].
-
(1997)
, vol.2-4 B
-
-
-
12
-
-
33646414637
-
The Art of Computer Virus Research and Defense
-
Addison-Wesley, Feb
-
Szor, P. (2005) The Art of Computer Virus Research and Defense. Addison-Wesley, Feb. 2005.
-
(2005)
-
-
Szor, P.1
-
13
-
-
84896294236
-
Virus Prevalence - 1995
-
Virus Btn, online, 28 Aug 2005
-
Virus Btn (1995) "Virus Prevalence - 1995", [online], http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=1995. [28 Aug 2005].
-
(1995)
-
-
-
14
-
-
84896265129
-
Virus Prevalence - 2004
-
Virus Btn, online, 28 Aug 2005
-
Virus Btn (2004) "Virus Prevalence - 2004", [online], http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=2004. [28 Aug 2005].
-
(2004)
-
-
|