Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-12Boris Larin, Costin Raiu
@online{larin:20211012:mysterysnail:35bdc92, author = {Boris Larin and Costin Raiu}, title = {{MysterySnail attacks with Windows zero-day}}, date = {2021-10-12}, url = {https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/}, language = {English}, urldate = {2021-10-14} } MysterySnail attacks with Windows zero-day
MysterySnail
2021-06-08KasperskyBoris Larin, Costin Raiu, Alexey Kulaev
@online{larin:20210608:puzzlemaker:43c7dfa, author = {Boris Larin and Costin Raiu and Alexey Kulaev}, title = {{PuzzleMaker attacks with Chrome zero-day exploit chain}}, date = {2021-06-08}, organization = {Kaspersky}, url = {https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/}, language = {English}, urldate = {2021-06-16} } PuzzleMaker attacks with Chrome zero-day exploit chain
Chainshot puzzlemaker
2021-04-13KasperskyBoris Larin, Brian Bartholomew, Costin Raiu
@online{larin:20210413:zeroday:8f9d6e3, author = {Boris Larin and Brian Bartholomew and Costin Raiu}, title = {{Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild}}, date = {2021-04-13}, organization = {Kaspersky}, url = {https://securelist.com/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild/101898/}, language = {English}, urldate = {2021-04-14} } Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild
2020-09-02Kaspersky LabsBoris Larin
@online{larin:20200902:operation:e5c12ad, author = {Boris Larin}, title = {{Operation PowerFall: CVE-2020-0986 and variants}}, date = {2020-09-02}, organization = {Kaspersky Labs}, url = {https://securelist.com/operation-powerfall-cve-2020-0986-and-variants/98329/}, language = {English}, urldate = {2020-09-03} } Operation PowerFall: CVE-2020-0986 and variants
2020-08-12Kaspersky LabsBoris Larin
@online{larin:20200812:internet:91fcf4e, author = {Boris Larin}, title = {{Internet Explorer and Windows zero-day exploits used in Operation PowerFall}}, date = {2020-08-12}, organization = {Kaspersky Labs}, url = {https://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/}, language = {English}, urldate = {2020-08-12} } Internet Explorer and Windows zero-day exploits used in Operation PowerFall
2020-06-24Kaspersky LabsBoris Larin
@online{larin:20200624:magnitude:90a4a71, author = {Boris Larin}, title = {{Magnitude exploit kit - evolution}}, date = {2020-06-24}, organization = {Kaspersky Labs}, url = {https://securelist.com/magnitude-exploit-kit-evolution/97436/}, language = {English}, urldate = {2020-06-24} } Magnitude exploit kit - evolution
2020-05-28Kaspersky LabsBoris Larin, Alexey Kulaev
@online{larin:20200528:zeroday:e7fee04, author = {Boris Larin and Alexey Kulaev}, title = {{The zero-day exploits of Operation WizardOpium}}, date = {2020-05-28}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-zero-day-exploits-of-operation-wizardopium/97086/}, language = {English}, urldate = {2020-05-29} } The zero-day exploits of Operation WizardOpium
2019-03-13Kaspersky LabsVasily Berdnikov, Boris Larin
@online{berdnikov:20190313:fourth:98b1131, author = {Vasily Berdnikov and Boris Larin}, title = {{The fourth horseman: CVE-2019-0797 vulnerability}}, date = {2019-03-13}, organization = {Kaspersky Labs}, url = {https://securelist.com/cve-2019-0797-zero-day-vulnerability/89885/}, language = {English}, urldate = {2019-12-20} } The fourth horseman: CVE-2019-0797 vulnerability
Stealth Falcon
2018-12-12Kaspersky LabsBoris Larin, Vladislav Stolyarov, Anton Ivanov
@online{larin:20181212:zeroday:4c8907e, author = {Boris Larin and Vladislav Stolyarov and Anton Ivanov}, title = {{Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)}}, date = {2018-12-12}, organization = {Kaspersky Labs}, url = {https://securelist.com/zero-day-in-windows-kernel-transaction-manager-cve-2018-8611/89253/}, language = {English}, urldate = {2019-12-20} } Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
SandCat
2018-11-14KasperskyBoris Larin, Anton Ivanov, Vladislav Stolyarov
@online{larin:20181114:new:4fe240d, author = {Boris Larin and Anton Ivanov and Vladislav Stolyarov}, title = {{A new exploit for zero-day vulnerability CVE-2018-8589}}, date = {2018-11-14}, organization = {Kaspersky}, url = {https://securelist.com/a-new-exploit-for-zero-day-vulnerability-cve-2018-8589/88845/}, language = {English}, urldate = {2022-04-12} } A new exploit for zero-day vulnerability CVE-2018-8589
2018-05-09KasperskyBoris Larin, Anton Ivanov, Vladislav Stolyarov
@online{larin:20180509:king:395c5c8, author = {Boris Larin and Anton Ivanov and Vladislav Stolyarov}, title = {{The King is dead. Long live the King!}}, date = {2018-05-09}, organization = {Kaspersky}, url = {https://securelist.com/root-cause-analysis-of-cve-2018-8174/85486/}, language = {English}, urldate = {2022-04-12} } The King is dead. Long live the King!
2018-02-08KasperskyBoris Larin, Vladislav Stolyarov
@online{larin:20180208:how:73fd187, author = {Boris Larin and Vladislav Stolyarov}, title = {{How not to use a driver to execute code with kernel privileges}}, date = {2018-02-08}, organization = {Kaspersky}, url = {https://securelist.com/elevation-of-privileges-in-namco-driver/83707/}, language = {English}, urldate = {2022-04-12} } How not to use a driver to execute code with kernel privileges