-
1
-
-
26844548971
-
-
Paul Bacher, Thorsten Holz, Markus Kotter, and Georg Wicherski, Know Your Enemy: Tracking Botnets, http://www.honeynet.org/papers/bots/, (2005).
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
Bacher, Paul1
Holz, Thorsten2
Kotter, Markus3
Wicherski, Georg4
-
4
-
-
85093819347
-
-
Phatbot Trojan Analysis, LURHQ Threat Intelligence Group
-
Phatbot Trojan Analysis, LURHQ Threat Intelligence Group, http://www.lurhq.com/phatbot.html, (2004).
-
(2004)
-
-
-
5
-
-
80052545115
-
-
LURHQ Threat Intelligence Group
-
Sinit P2P Trojan Analysis, LURHQ Threat Intelligence Group, http://www.lurhq.com/sinit.html, (2004).
-
(2004)
Sinit P2P Trojan Analysis
-
-
-
6
-
-
84860554986
-
Bot software looks to improve peerage
-
Robert Lemos, Bot software looks to improve peerage, SecurityFocus, http://www.securityfocus.com/news/11390, (2006).
-
(2006)
SecurityFocus
-
-
Lemos, Robert1
-
7
-
-
85093836067
-
-
Backdoor.Rustock.B, Symantec, http://www.sarc.com/avcenter/venc/ data/backdoor.rustock.b.html, (2006).
-
(2006)
Backdoor.Rustock.B, Symantec
-
-
-
8
-
-
85093831669
-
-
Spam-Mailbot.c
-
Spam-Mailbot.c, McAfee, http://vil.nai.com/vil/content/v_140181.htm, (2006).
-
(2006)
McAfee
-
-
-
10
-
-
85093839479
-
-
IDA Pro
-
IDA Pro, http://www.datarescue.com/ idabase
-
-
-
-
12
-
-
0003855464
-
-
Second Edition, John Wiley and Sons, New York, NY
-
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, John Wiley and Sons, New York, NY, (1996).
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, Bruce1
-
13
-
-
85093832020
-
-
RC4 C source code
-
RC4 C source code, http://www.cypherspace.org/adam/rsa/rc4.c
-
-
-
-
14
-
-
85093848316
-
-
Microsoft User Mode Process Dumper, http://www.microsoft.com/downloads/details.aspx?FamilyID=E089CA41-6A87-40C8-BF69-28AC08570B7E& displaylang=en
-
Microsoft User Mode Process Dumper
-
-
-
15
-
-
85028313719
-
-
Microsoft windbg, http://www.microsoft.com/whdc/devtools/debugging/ default.mspx
-
Microsoft windbg
-
-
-
16
-
-
34748820878
-
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
-
(December)
-
Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, and Wenke Lee, PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006) (December 2006).
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006)
-
-
Royal, Paul1
Halpin, Mitch2
Dagon, David3
Edmonds, Robert4
Lee, Wenke5
|