Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock
2007-03-20SecureworksDon Jackson
Gozi Trojan
Gozi
2007-01-09SecureworksJoe Stewart
A Rustock-ing Stuffer
Rustock
2006-11-13Secure Science CorporationMicael Ligh
Malware Case Study - ZeusMalware
Zeus
2006-06-26Kaspersky LabsKaspersky
Erpresser
GPCode
2006-01-15ESET ResearchVirus Radar
Win32/Neshta
neshta
2004-10-06F-SecureEro Carrera, Gergely Erdélyi
Digital genome mapping: advanced binary malware analysis
Bagle
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-03-25Kaspersky
Nyxem
Nyxem
2004-01-30Applied Watch TechnologiesEric S. Hines
MyDoom.B Worm Analysis
MyDoom
2004-01-01GIACSrinivas Ganti
MyDoom and its backdoor
MyDoom
2003-08-22CNNBill Tucker
SoBig.F breaks virus speed records
Sobig
2001-06-27The Wall Street JournalTed Bridis
Net Espionage Rekindles Tensions As U.S. Tries to Identify Hackers
2000-01-01Carnegie Mellon UniversityCERT Division
2000 CERT Advisories
Iloveyou
1997-09-01Phrack Magazinedaemon9
LOKI2 (the implementation)
1900-01-01Security AffairsPierluigi Paganini
Hackers Broke Into the Celeb London Bridge Plastic Surgery Clinic
TheDarkOverlord