Click here to download all references as Bib-File.•
2009-03-08
⋅
SRI International
⋅
Conficker C Analysis Conficker |
2009-03-04
⋅
FireEye
⋅
‘Bancos’ - A Brazilian Crook bancos |
2009-01-01
⋅
Sunbelt Malware Research Labs
⋅
Rootkit Installation and Obfuscation in Rustock Rustock |
2008-11-30
⋅
ThreatExpert
⋅
Agent.btz - A Threat That Hit Pentagon Agent.BTZ |
2008-11-26
⋅
FireEye
⋅
Technical details of Srizbi's domain generation algorithm Szribi |
2008-05-18
⋅
ThreatExpert
⋅
Rustock.C – Unpacking a Nested Doll Rustock |
2008-01-07
⋅
Royal Air Force
⋅
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity |
2008-01-01
⋅
Dr.Web
⋅
Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat Rustock |
2006-11-13
⋅
Secure Science Corporation
⋅
Malware Case Study - ZeusMalware Zeus |
2004-04-15
⋅
SANS GIAC
⋅
MyDoom is Your Doom: An Analysis of the MyDoom Virus MyDoom |
2004-01-30
⋅
Applied Watch Technologies
⋅
MyDoom.B Worm Analysis MyDoom |
1997-09-01
⋅
Phrack Magazine
⋅
LOKI2 (the implementation) |