2009

From Botnets.fr
Jump to: navigation, search

(Year/Month)

Description

Botnets

Publications

 AuthorEditorBotnet
'Tigger' trojan keeps security researchers hoppingTim WilsonUBM TechWebTigger
A Foray into Conficker’s Logic and Rendezvous PointsLEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and moreConficker
A study of the Ilomo / Clampi botnetAlice Decker
David Sancho
Max Goncharov
Robert McArdle
Trend MicroClampi
Adrenalin botnet. The trend marks the Russian crimewareJorge MieresEvilfingersAdrenalin
An Analysis of the iKeeB (duh) iPhone botnet (Worm)Philip Porras
Hassen Saidi
Vinod Yegneswaran
SRI International
Botnet: classification, attacks, detection, tracing, and preventive measuresJing Liu
Yang Xiao
Hongmei Deng
Jingyuan Zhang
EURASIP Journal on Wireless Communications and NetworkingPhatbot
Agobot
SDBot
SpyBot
Forbot
XtremBot
Netdevil
UrBot
RBot
UrXBot
Cimbot - A technical analysisJulia WolfFireEyeCimbot
Clampi/Ligats/Ilomo trojanJoe StewartDELL SecureWorksClampi
Detection and classification of different botnet C&C channelsGregory Fedynyshyn
Mooi Choo Chuah
Gang Tan
Lehigh University. BethlehemIrcbot
Agobot
Rustock
Storm
Bobax
Waledac
UDP Storm
Google Groups trojanGavin O’GormanSymantecGrups
Gumblar Google-poisoning attack morphsJohn LeydenThe RegisterGumblar
How to steal a Botnet and what can happen when you doRichard KemmererGoogleTorpig
Hébergeurs malhonnêtes : nouvelle fermeture (3FN)Eric FreyssinetCriminalités numériques
Maazben: best of both worldsRodel MendrezM86 Security labsMaazben
OSX.Iservice technical detailsElia FlorioSymantecIBotnet
OSX.iService its not going to iWork for youBen NahorneySymantecIBotnet
Russian service online to check the detection of malwareJorge MieresMalware Intelligence
SDBot IRC botnet continues to make wavesLoucif KharouniTrend MicroSDBot
Stealthy router-based botnet worm squirmingRyan NaraineZDNetPsybot
The Waledac protocol: the how and whyGreg Sinclair
Chris Nunnery
Brent ByungHoon Kang
Malicious and Unwanted Software (MALWARE)Waledac
The growing threat to business banking onlineBrian KrebsWashington PostClampi
The tigger trojan: icky, sticky stuffBrian KrebsWashington PostTigger
Trojan.Whitewell: what’s your (bot) Facebook status today?Andrea LelliSymantecWhitewell
Trusteer warns of new two headed trojan attack against online banksPress releaseTrusteerSilon
Twitter + Pastebin = malware updatePatrick FitzgeraldSymantecSninfs
Un WOMBAT pour évaluer la cybercriminalitéCorrado Leita
V.H. Pham
Olivier Thonnard
Marc Dacier
E. Kirda
SSTIC
Virus scanners for virus authorsBrian KrebsKrebs on Security
Waledac Botnet - Deployment and Communication AnalysisKyle Yang
Derek Manky
FortinetWaledac
Xarvester, the new Srizbi?Gavin NealeM86 Security LabsXarvester
Your botnet is my botnet: analysis of a botnet takeoverBrett Stone-Gross
Marco Cova
Lorenzo Cavallaro
Bob Gilbert
Martin Szydlowski
Richard A Kemmerer
Christopher Kruegel
Giovanni Vigna
Department of Computer Science, University of California, Santa BarbaraTorpig