Click here to download all references as Bib-File.•
2007-04-03
⋅
USENIX
⋅
A Case Study of the Rustock Rootkit and Spam Bot Rustock |
2007-03-20
⋅
Secureworks
⋅
Gozi Trojan Gozi |
2007-01-09
⋅
Secureworks
⋅
A Rustock-ing Stuffer Rustock |
2006-11-13
⋅
Secure Science Corporation
⋅
Malware Case Study - ZeusMalware Zeus |
2006-06-26
⋅
⋅
Kaspersky Labs
⋅
Erpresser GPCode |
2006-01-15
⋅
ESET Research
⋅
Win32/Neshta neshta |
2004-10-06
⋅
F-Secure
⋅
Digital genome mapping: advanced binary malware analysis Bagle |
2004-04-15
⋅
SANS GIAC
⋅
MyDoom is Your Doom: An Analysis of the MyDoom Virus MyDoom |
2004-03-25
⋅
Nyxem Nyxem |
2004-01-30
⋅
Applied Watch Technologies
⋅
MyDoom.B Worm Analysis MyDoom |
2004-01-01
⋅
GIAC
⋅
MyDoom and its backdoor MyDoom |
2003-08-22
⋅
CNN
⋅
SoBig.F breaks virus speed records Sobig |
2001-06-27
⋅
The Wall Street Journal
⋅
Net Espionage Rekindles Tensions As U.S. Tries to Identify Hackers |
2000-01-01
⋅
Carnegie Mellon University
⋅
2000 CERT Advisories Iloveyou |
1997-09-01
⋅
Phrack Magazine
⋅
LOKI2 (the implementation) |
1900-01-01
⋅
Security Affairs
⋅
Hackers Broke Into the Celeb London Bridge Plastic Surgery Clinic TheDarkOverlord |