Difference between revisions of "Bac à sable"

From Botnets.fr
Jump to navigation Jump to search
Line 1: Line 1:
{{#ask:[[Category:Publications]][[Link::~*%20*]]|?link}}
{{#ask:[[Category:Publications]][[Link::~http* *]]|?link}}

Revision as of 21:14, 5 August 2015

 Link
A Foray into Conficker’s Logic and Rendezvous Points
A case study on Storm worm
A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
A study on botnet detection techniques
APT1: technical backstage
Adobe Flash Player 0-day and HackingTeam's Remote Control System
An advanced hybrid peer-to-peer botnet
Analyse de Xtreme RAT
Analyse of the sample cdorked.A
Analyse statique de Duqu stage 1
Analyse statique de Duqu stage 2
Analysis of TDL4
Analysis of Ysreef (a variant of Tobfy)
Analysis of a “/0” stealth scan from a botnet
Analysis of functions used to encode strings in Flame (GDB script)
Analysis of the malware of Red October - Part 1
Analysis of the malware of Red October - Part 2
Andromeda 2.7 features
Anunak:APT against financial institutions
Armenian Bredolab creator jailed for computer sabotage
AutoIT ransomware
Back to Stuxnet: the missing link
BareBox: efficient malware analysis on bare-metal
Battling the Zbot threat
Blackhole, CVE-2012-0507 and Carberp
BotGrep: finding P2P bots with structured graph analysis
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
Botnet construction, control and concealment
Botnet operation disabled
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
Carberp + BlackHole = growing fraud incidents
Carberp - a modular information stealing trojan
Carberp gang evolution: CARO 2012 presentation
Carberp reverse engineering
Carberp-in-the-Mobile
Carberp: it’s not over yet
Case study of the Miner botnet
Chameleon botnet grabbed $6m A MONTH from online ad-slingers
Citadel plitfi botnet report
Citadel trojan malware analysis
Combatting point-of-sale malware
Conficker working group: lessons learned
Cracking down on botnets
Cracking the encrypted C&C protocol of the ZeroAccess botnet
DGAs and cyber-criminals: a case study
DarkMegi rootkit - sample (distributed via Blackhole)
Department of Justice takes action to disable international botnet
Digging inside Tinba malware - A walkthrough
Discerning relationships: the Mexican botnet connection
... further results