Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2011-10-07Contagiodump BlogMila Parkour
Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Rustock
2011-09-09CodeProjectAmrThabet
Stuxnet Malware Analysis Paper
Stuxnet
2011-08-04Stop Malvertising RootkitsKimberly
Analysis of ngrBot
NgrBot
2011-07-07Contagio DumpMila Parkour
Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7
Alureon
2011-01-30Steven K
GpCode Ransomware 2010 Simple Analysis
GPCode
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2009-10-08Defence Intelligence, Ministry of Defence UKMatt Thompson
Mariposa Botnet Analysis
Mariposa
2009-06-23SecureworksJoe Stewart
Virut Encryption Analysis
Virut
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2007-12-16SecureworksJoe Stewart
Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy
2004-10-06F-SecureEro Carrera, Gergely Erdélyi
Digital genome mapping: advanced binary malware analysis
Bagle
2004-10-06F-SecureEro Carrera, Gergely Erdélyi
Digital genome mapping: advanced binary malware analysis
Bagle
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-01-30Applied Watch TechnologiesEric S. Hines
MyDoom.B Worm Analysis
MyDoom