References
- AVTEST, AV-Test.org
- Anubis, anubis.iseclab.org
- CWSandbox, www.sunbeltsandbox.com
- Norman Sandbox, www.norman.com/technology/norman_sandbox/
- BitBlaze, bitblaze.cs.berkeley.edu
- CVE-2009-4324 PDF Communist China remove missiles from Qiying526@ntu.edu.tw, contagiodump.blogspot.com
- Joedoc, www.joedoc.org
- VMUnpacker, http://sucop.com/
- Generic Unpacker, www.exetools.com/unpackers.htm
- Prices of Russian crimeware, http://evilfingers.blogspot.com/2009/03/russian-prices-of-crimware.html
- Prices of Russian crimeware. Part 2, http://evilfingers.blogspot.com/2009/08/prices-of-russian-crimeware-part-2.html
- ZeuEsta: ZeuS cybercrime hosting with SPack, http://www.abuse.ch/?p=1662
- ZeuS and power Botnet zombie recruitment, http://evilfingers.blogspot.com/2009/10/zeus-and-power-botnet-zombie.html
- Symantec Global Internet Security Threat Report Trends for 2008, http://www.symantec.com/connect/downloads/symantec-global-internet-security-threat-report-trends-200, 2009
- TrendMicro The Real Face of KOOBFACE : The Largest Web 2.0 Botnet Explained, http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_real_face_of_koobface_jul2009.pdf, 2009
- Dwan Dong, Bavid Brumley, BitBlaze : A New Approach to Computer Security via Binary Analysis, ICISS 2008, pp.1-25, 2008
- Anh M. Nguyen, Nabil Schear, MAVMM : Leightweight and Purpose Built VMM Malware Analysis, Computer Security Applications Conference 2009, pp 441.450, 2009
- Zhiqiang Lin,p Xiangyu Zhang, Automatic Reverse Engineering of Data Structures from Binary Execution, NDSS 2010, 2010
- Kelly Jackson Higgins, Senior Editor, Dark Reading, "The World's Biggest Botnets", http://www.darkreading.com/document.asp?doc_id=138610&WT.svl=news1_1
- Yi-Min Wang, Doug Beck, Xuxian Jiang, and Roussi Roussev, "Automated Web Patrol with Strider Honey-Monkeys: Finding Web Sites That Exploit Browser Vulnerabilities", NDSS(ANNUAL SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY)06, August 2006
- Radek Hes, Peter Komisarczuk, Ramon Steenson, Christian Seifert, "The Capture-HPC client architecture", 2009, http://ecs.victoria.ac.nz/twiki/pub/Main/TechnicalReportSeries/ECSTR09-11.pdf
- Ali Ikinci, Thorsten Holz, Felix Freiling, "Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients", Proceedings of Sicherheit 2008, April, 2008