Semantic search

Jump to navigation Jump to search
Condition
Printout selection
Options
Parameters [
limit:

The maximum number of results to return
offset:

The offset of the first result
link:

Show values as links
headers:

Display the headers/property names
mainlabel:

The label to give to the main page name
intro:

The text to display before the query results, if there are any
outro:

The text to display after the query results, if there are any
searchlabel:

Text for continuing the search
default:

The text to display if there are no query results
class:

An additional CSS class to set for the table
transpose:

Display table headers vertically and results horizontally
sep:

The separator between results
Sort options
Delete
Add sorting condition
Debug output SQLStore
ASK Query
[[Category:Publications]] [[Editor::Kaspersky lab]]
SQL Query
SELECT DISTINCT
  t0.smw_id AS id,
  t0.smw_title AS t,
  t0.smw_namespace AS ns,
  t0.smw_iw AS iw,
  t0.smw_subobject AS so,
  t0.smw_sortkey AS sortkey, t0.smw_sort
FROM
  `smw_object_ids` AS t0
INNER JOIN
  (`smw_fpt_inst` AS t2
INNER JOIN
  `smw_di_wikipage` AS t4 ON t2.s_id=t4.s_id) ON t0.smw_id=t2.s_id
WHERE
  (t2.o_id=25301
   AND (t4.p_id=25307 AND t4.o_id=2275)
  )
  AND t0.smw_iw!=':smw'
  AND t0.smw_iw!=':smw-delete'
  AND t0.smw_iw!=':smw-redi'
ORDER BY
  t0.smw_sort ASC
LIMIT
  55
OFFSET
  0
SQL Explain
IDselect_typetabletypepossible_keyskeykey_lenrefrowsfilteredExtra
1SIMPLEt4refs_id, o_id, p_id, s_id_2, s_id_3, o_id_2, o_id_3o_id_25const51Using where; Using temporary; Using filesort
1SIMPLEt2refs_id, o_id, s_id_2, o_id_2s_id_29wiki.t4.s_id, const1Using index
1SIMPLEt0eq_refPRIMARY, smw_id, smw_iw, smw_iw_2PRIMARY4wiki.t4.s_id1Using where
Auxilliary Tables
No auxilliary tables used.
Query Metrics
Query-Size:3
Query-Depth:1
Errors and Warnings
None
 AuthorBotnetYear
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATNetTraveler2013
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey Golovanov2013
Armenian Bredolab creator jailed for computer sabotageChristopher BrookBredolab2012
Back to Stuxnet: the missing linkAleksFlame
Stuxnet
2012
BoteAR: a “social botnet”- What are we talking aboutJorge MieresBoteAR2012
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnetStefan OrtloffKelihos2012
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnetTillmann WernerKelihos2011
Carberp-in-the-MobileDenis MaslennikovCarberp2012
Carberp: it’s not over yetVyacheslav ZakorzhevskyCarberp2012
Critroni crypto ransomware seen using Tor for command and controlDennis FisherCTB-Locker2014
Dorifel is much bigger than expected and it’s still active and growing!David JacobyDorifel2012
Duqu FAQRyan NaraineDuqu
Stuxnet
2011
Flame: replication via Windows Update MITM proxyAleksFlame2012
Flashfake Mac OS X botnet confirmedIgor SoumenkovFlashback2012
Full analysis of Flame's Command & Control serversGReATFlame2012
Full analysis of Flame's command & control serversGReATFlame2012
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATFlame
Gauss
Stuxnet
2012
Gauss: abnormal distributionGReATGauss2012
IRC bot for AndroidDenis Maslennikov2012
Kelihos/Hlux botnet returns with new techniquesMaria GarnaevaKelihos2012
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKelihos2013
Latin American banks under fire from the Mexican VOlk-botnetJorge MieresVOlk2011
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezMadi2012
NetTraveler APT gets a makeover for 10th birthdayKurt Baumgartner
Costin Raiu
NetTraveler2014
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuNetTraveler2013
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueHangOver2013
New crimeware attacks LatAm bank usersJorge MieresPiceBOT
VOlk
S.A.P.Z.
2013
Shamoon the Wiper in detailsDmitry TarakanovShamoon2012
Shamoon the Wiper: further details (Part II)Dmitry TarakanovShamoon2012
Shamoon the wiper - copycats at workGReATShamoon
EraseMBR
2012
TDL4 - Top BotSergey Golovanov
Igor Soumenkov
TDL-42011
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agenciesGReATRocra2013
The Epic Turla operationGReATTurla2014
The Flame: questions and answersAlexander GostevFlame2012
The Madi campaign - Part IINicolas BrulezMadi2012
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoorGReATMiniDuke2013
The most sophisticated Android trojanRoman UnuchekObad2013
The mystery of Duqu framework solvedIgor SoumenkovDuqu2012
The mystery of Duqu: part fiveIgor SoumenkovDuqu2011
The mystery of Duqu: part oneAlexander GostevDuqu
Stuxnet
2011
The mystery of Duqu: part six (the command and control servers)Vitaly KamlukDuqu2011
The mystery of Duqu: part tenAlexander GostevDuqu2012
The mystery of Duqu: part threeAlexander GostevDuqu2011
The mystery of Duqu: part twoAlexander GostevDuqu2011
The mystery of the Duqu frameworkIgor SoumenkovDuqu2012
The where and why of HluxSergey GolovanovBredolab
Kelihos
Virut
Gbot
2012
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezMadi2012
The ‘advertising’ botnetMaria Garnaeva
Alexei Kadiev
Renos2011
What was that Wiper thing?GReATWiper2012
XPAJ: reversing a Windows x64 bootkitVyacheslav RusakovXpaj2012