Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-07GoogleFabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Cecilia M. Procopiuc, Jennifer Pullman, David Tao, Borbala Benko, Elie Bursztein
@techreport{kaczmarczyck:20201207:spotlight:a65ba49, author = {Fabian Kaczmarczyck and Bernhard Grill and Luca Invernizzi and Cecilia M. Procopiuc and Jennifer Pullman and David Tao and Borbala Benko and Elie Bursztein}, title = {{Spotlight: Malware Lead Generation at Scale}}, date = {2020-12-07}, institution = {Google}, url = {https://storage.googleapis.com/pub-tools-public-publication-data/pdf/5987ab07bad53af0a980f35849a86a655793bb17.pdf}, language = {English}, urldate = {2021-04-16} } Spotlight: Malware Lead Generation at Scale
2018-07-26IEEE Symposium on Security and Privacy (SP)Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Kylie McRoberts, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy
@techreport{huang:20180726:tracking:b51d0ee, author = {Danny Yuxing Huang and Maxwell Matthaios Aliapoulios and Vector Guo Li and Luca Invernizzi and Kylie McRoberts and Elie Bursztein and Jonathan Levin and Kirill Levchenko and Alex C. Snoeren and Damon McCoy}, title = {{Tracking Ransomware End-to-end}}, date = {2018-07-26}, institution = {IEEE Symposium on Security and Privacy (SP)}, url = {https://storage.googleapis.com/pub-tools-public-publication-data/pdf/ce44cbda9fdc061050c1d2a5dec0270874a9dc85.pdf}, language = {English}, urldate = {2021-04-16} } Tracking Ransomware End-to-end
Cerber Locky WannaCryptor