2009

From Botnets.fr
Jump to navigation Jump to search

(Year/Month)

Description

Botnets

Publications

 AuthorEditorBotnetCampaign
'Tigger' trojan keeps security researchers hoppingTim WilsonUBM TechWebTigger
A Foray into Conficker’s Logic and Rendezvous PointsLEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and moreConficker
A study of the Ilomo / Clampi botnetAlice Decker
Max Goncharov
Robert McArdle
David Sancho
Trend MicroClampi
Adrenalin botnet. The trend marks the Russian crimewareJorge MieresEvilfingersAdrenalin
An Analysis of the iKeeB (duh) iPhone botnet (Worm)Philip Porras
Hassen Saidi
Vinod Yegneswaran
SRI International
Botnet: classification, attacks, detection, tracing, and preventive measuresJing Liu
Yang Xiao
Hongmei Deng
Jingyuan Zhang
EURASIP Journal on Wireless Communications and NetworkingAgobot
Phatbot
Forbot
XtremBot
SDBot
SpyBot
Netdevil
UrBot
RBot
UrXBot
Cimbot - A technical analysisJulia WolfFireEyeCimbot
Clampi/Ligats/Ilomo trojanJoe StewartDELL SecureWorksClampi
Detection and classification of different botnet C&C channelsGregory Fedynyshyn
Mooi Choo Chuah
Gang Tan
Lehigh University. BethlehemAgobot
Bobax
Rustock
Storm
Waledac
Ircbot
UDP Storm
Google Groups trojanGavin O’GormanSymantecGrups
Gumblar Google-poisoning attack morphsJohn LeydenThe RegisterGumblar
How to steal a Botnet and what can happen when you doRichard KemmererGoogleTorpig
Hébergeurs malhonnêtes : nouvelle fermeture (3FN)Eric FreyssinetCriminalités numériques3FN
McColo
Maazben: best of both worldsRodel MendrezM86 Security labsMaazben
OSX.Iservice technical detailsElia FlorioSymantecIBotnet
OSX.iService its not going to iWork for youBen NahorneySymantecIBotnet
Russian service online to check the detection of malwareJorge MieresMalware Intelligence
SDBot IRC botnet continues to make wavesLoucif KharouniTrend MicroSDBot
Stealthy router-based botnet worm squirmingRyan NaraineZDNetPsybot
The Waledac protocol: the how and whyChris Nunnery
Brent ByungHoon Kang
Greg Sinclair
Malicious and Unwanted Software (MALWARE)Waledac
The growing threat to business banking onlineBrian KrebsWashington PostClampi
The tigger trojan: icky, sticky stuffBrian KrebsWashington PostTigger
Trojan.Whitewell: what’s your (bot) Facebook status today?Andrea LelliSymantecWhitewell
Trusteer warns of new two headed trojan attack against online banksPress releaseTrusteerSilon
Twitter + Pastebin = malware updatePatrick FitzgeraldSymantecSninfs
Un WOMBAT pour évaluer la cybercriminalitéCorrado Leita
Marc Dacier
V.H. Pham
Olivier Thonnard
E. Kirda
SSTIC
Virus scanners for virus authorsBrian KrebsKrebs on Security
Waledac Botnet - Deployment and Communication AnalysisKyle Yang
Derek Manky
FortinetWaledac
Xarvester, the new Srizbi?Gavin NealeM86 Security LabsXarvester
Your botnet is my botnet: analysis of a botnet takeoverBrett Stone-Gross
Christopher Kruegel
Giovanni Vigna
Marco Cova
Lorenzo Cavallaro
Bob Gilbert
Martin Szydlowski
Richard A Kemmerer
Department of Computer Science, University of California, Santa BarbaraTorpig