HOME _ .. .. u dF dF 88Nu. u. uL .. x. . u. u. '88bu. .u . .u . u. x. . u. u. '88bu. '88888.o888c .@88b @88R .@88k z88u x@88k u@88c. '*88888bu .u .d88B :@8c uL .d88B :@8c ...ue888b .@88k z88u x@88k u@88c. '*88888bu ^8888 8888 '"Y888k/"*P ~"8888 ^8888 ^"8888""8888" ^"*8888N ud8888. ="8888f8888r .ue888Nc.. ="8888f8888r 888R Y888r ~"8888 ^8888 ^"8888""8888" ^"*8888N 8888 8888 Y888L 8888 888R 8888 888R beWE "888L :888'8888. 4888>'88" d88E`"888E` 4888>'88" 888R I888> 8888 888R 8888 888R beWE "888L 8888 8888 8888 8888 888R 8888 888R 888E 888E d888 '88%" 4888> ' 888E 888E 4888> ' 888R I888> 8888 888R 8888 888R 888E 888E 8888 8888 `888N 8888 888R 8888 888R 888E 888E 8888.+" 4888> 888E 888E 4888> 888R I888> 8888 888R 8888 888R 888E 888E .8888b.888P .u./"888& 8888 ,888B . 8888 888R 888E 888F 8888L .d888L .+ 888E 888E .d888L .+ u8888cJ888 8888 ,888B . 8888 888R 888E 888F ^Y8888*"" d888" Y888*" "8888Y 8888" "*88*" 8888" .888N..888 '8888c. .+ ^"8888*" 888& .888E ^"8888*" "*888*P" "8888Y 8888" "*88*" 8888" .888N..888 `Y" ` "Y Y" `Y" 'YP "" 'Y" `"888*"" "88888% "Y" *888" 888& "Y" 'Y" `Y" 'YP "" 'Y" `"888*"" "" "YP' `" "888E "" .dWi `88E 4888~ J8% ^"===*"` archive | code | zines | papers | samples | translations | supporters | contact
z0mbie/29a 21 Ways To Reset A Register
Hooking WinNT/2K/XP API
Code Transformation and Finite Automatons
Automated Reverse Engineering: Mistfall Engine
Disassemblers Within Viruses
DELAYED CODE
VIRUS ENGINES: COMMON RECOMMENDATIONS
Executable Trash Generator (ETG Engine)
HOW TO CREATE YOUR OWN RSA KEY
I.Danilov vs V.Bogdanov (Dr.Web vs AVP): Programmer's Competition [EN]
Injected Evil: (executable files infection) [TEXT FORMAT]
KME-32: Kewl Mutation Engine User's Manual [EN]
LDE32: Length-Disassembler Engine User's Manual [EN]
ADDING LDT ENTRIES IN WIN2K
libtcc can be useful to use tcc as a "backend" for a code generator
SOME IDEAS ABOUT METAMORPHISM
METAMORPHISM AND PERMUTATION: FEEL THE DIFFERENCE
Description of the Win9X INT 2E services (VMM/NTKERN.VxD) [EN]
Opcode Frequency Statistics
TRAITOR OUTLOOK
WRITING INTO KERNEL FROM RING-3: LETS FUCK PAGETABLE [EN]
Permutation conditions
Polymorphic Games
PRCG: Polymorphic Recursive Cycle Generator
PERVERT WORLD WIDE
ABOUT REVERSING
LIMITING DATA TRANSFER SPEED
TCP switch
TRACING UNDER WIN32
ABOUT UNDETECTABLE VIRUSES
DATA ENCODING IN META VIRUSES
VMware has you
H2HC Anti-Forensics by Domingo Montanaro
Process Infection by Carlos Barros
Detecting BluePill by Edgar Barbosa
PE Binary Infection by Maycon Vitali
Malwares VS Antivírus by Wendel Guglielmetti Henrique
Kernel-Land Rootkits by "Strauss" + Code
PCI Rootkits by Bruno Cardoso Lopes and João Batista Correa
Ring x64
Realidade das BotNets Atuais by Ranieri Romera
Detecting Obfuscated Malicious JavaScript with Snort and Razorback by Alex Kirk
I Know Kung-Fu! Analyzing Mobile Malware by Alex Kirk
Linux Kernel Rootkits by Ilya V. Matveychikov and Ighor Augusto
Construindo Bootkits: Ideias para GRUB2 com Linux
UEFI Firmware Rootkits: Myths and Reality by Alex Matrosov and Eugene Rodionov
kernelmode
Site Archive kernelmode.info
VxHeaven
Site Archive VxHeaven
Complete Paper Download Complete PDF Collection
PDF File Listing Taming Lakatos' Monster - Computer Virus Epidemics and Internet Security Policy
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
Computer viruses - a high-tech disease
On callgraphs and generative mechanisms(Erratum)
Viruses, Worms, Zombies, and other Beasties
MCF: a malicious code filter
Detecting Stealth Software with Strider GhostBuster
It's a bird, it's a plane, it's Fooperman
Slackspace
Striking Similarities
Detecting Early Worm Propagation through Packet Matching
Iranian Journal Examines Electronic Warfare
Worm Meets Beehive
Вирусы мозга
Open problems in computer virology
Danger theory and collaborative filtering in MANETs
Protection of computer systems from computer viruses:: ethical and practical issues
Modeling Virus Propagation in Peer-to-Peer Networks
Towards Stealthy Malware Detection
Finding Malware on Compromised Windows Machines
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses
Covert Distributed Processing with Computer Viruses
Real world anti-virus product reviews and evaluations - the current state of affairs
Language models for detection of unknown attacks in network traffic
Reverse Engineering Malware
A Computational Model of Computer Virus Propagation
Computer Viruses: A Management Perspective
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals
Those ubiquitous viruses
Malware in Popular Networks
Automatic Static Unpacking of Malware Binaries
Marginal Networks: The Virus between Complexity and Suppression
Virus Proof Your PC
The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code
Imposing Order on Program Statements to Assist Anti-Virus Scanners
Learning to Detect and Classify Malicious Executables in the Wild
Halting viruses in scale-free networks
Осторожно: компьютерные вирусы
Password Cracking: A Game of Wits
Unknown Computer Virus Detection Inspired by Immunity
JAB, une backdoor pour reseau Win32 inconnu
Threats to Digitization: Computer Virus
Computer Viruses - Legal Options
Efficient Static Analysis of Executables For Detecting Malicious Behaviors
Stack Shape Analysis to Detect Obfuscated calls in Binaries
Malicious Data and Computer Security
Autoimmune computer virus
Zmist Opportunities
Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing
Usability evaluation of anti-phishing toolbars
On self-reproducing computer programs
ACPI and SMI handlers: some limits to trusted computing
Malware Detection Based on Suspicious Behavior Identification
Malware: Von Viren, Würmern, Hackern und Trojanern und wie man sich vor ihnen schützt
Secure and advanced unpacking using computer emulation
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table
Happy Gets Lucky?
Criss-cross
Evolution of cross site request forgery attacks
Anti-Forensics: The Rootkit Connection
Network Worms
Enabling automated threat response through the use of a dynamic security policy
Computer Viruses: The Disease, the Detection, and the Prescription for Protection Testimony
Computer viruses (BMJ 296-013)
Understanding and Managing Polymorphic Viruses
Disk-Level Behavioral Virus Detection
Old Win32 Code for a Modern Super-stealth Trojan
Seminar Report on Study of Viruses and Worms
Dynamic detection and classi cation of computer viruses using general behaviour patterns
Semantics-Aware Malware Detection
Computers under attacks!
A Cost Analysis of Typical Computer Viruses and Defenses
A little journey inside Windows memory
Virus Inoculation on Social Graphs The Friendship Factor
Computational Aspects of Computer Viruses
Learning to Detect Malicious Executables in the Wild
A Trust System Based on Multi Level Virus Detection
Attitude Adjustment: Trojans and Malware on the Internet
Notes on the "Worms" programs -- some early experience with a distributed computation
Impeding worm epidemics through destination address filtering
Virus Prevention Without Signatures
User-mode memory scanning on 32-bit & 64-bit windows
Computer Virus Propagation Model Based on Variable Propagation Rate
An Architecture for Generating Semantic-Aware Signatures
Viruses and Criminal Law
Behavioral detection of malware from a survey towards an established taxonomy
First Virus?
Directed-Graph Epidemiological Models of Computer Viruses
An Undetectable Computer Virus
Universal Procedures to Protect Against Computer Viruses
Vx-trading
On the functional validity of the worm-killing worm
Accurately Detecting Source Code of Attacks That Increase Privilege
Warped Logic?
Biologically Inspired Defenses Against Computer Viruses
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware
Darwin inside the machines: Malware evolution and the consequences for computer security
HoneyStat: Local Worm Detection Using Honeypots
Modeling Botnet Propagation Using Time Zones
New method of fighting computer viruses announced
Simulating malware with MAlSim
There Is No Ideal Virus Scanner
A method to detect metamorphic computer viruses
Data Mining Methods for Detection of New Malicious Executables
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions
Viruses and Computer Security
Quantitative risk assessment of computer virus attacks on computer networks
A Proposed Taxonomy of Software Weapons
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
Conceptual Frameworks for Artificial Immune Systems
Computer viruses demystified,2
Auto-Sign an automatic signature generator for high-speed malware filtering devices
Evolution, Ecology and Optimization of Digital Organisms
Bot Software Spreads, Causes New Worries
Algebraic Specification of Computer Viruses and Their Environments
The cause and effects of computer viruses
Consensual Realities in Cyberspace
Benefits and Considerations for a Single-Vendor Antivirus Strategy
Automatic binary deobfuscation
I.T. IN PRACTICE: Computer viruses
An Overview of Unix Rootkits
Malicious actions against the GPRS technology
Viruses Bottleneck Prosecution
Bad IDEA
A Feature Selection and Evaluation Scheme for Computer Virus Detection
Modelling Development of Epidemics with Dynamic Small-World Networks
Computer Viruses and Malware
Identification of file infecting viruses through detection of self-reference replication
Virus Scanners for Multiple OSes
IMAD: In-Execution Malware Analysis and Detection
Code obfuscation and virus detection
Networks, Control, and Life-Forms
SubVirt: Implementing malware with virtual machines
An Introduction to Computer Viruses
Self-* information systems: why not?
A Retrovirus Inspired Algorithm for Virus Detection & Optimization
A bit of viral protection is worth a megabyte of cure
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection?
FPGA Viruses
Prophylaxis for "virus" propagation and general computer security policy
SmartSiren: Virus Detection and Alert for Smartphones
Towards Viable Worm Defenses
In-depth analysis of the viral threats with OpenOffice.org documents
Detecting Worms through Cryptographic Hashes
Detecting Sources of Computer Viruses in Networks: Theory and Experiment
Detecting Viral Propagations Using Email Behavior Profiles
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings
Frankie say relax
Immune System for Virus Detection and Elimination
Practical overview of a Xen covert channel
Mind Wars: Attack of the Memes
On the Semantics of Self-Unpacking Malware Code
A Generic Virus Detection Agent on the Internet
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense
Introducing Stealth Malware Taxonomy
Geometry-based flash worm detection
Fileprint analysis for Malware Detection
Die Gefahr Von Debug Codes
Anti-Virus in the Corporate Arena
The Internet Worm Program : An Analysis
Free Anti-Virus Tips and Techniques
Execution Context in Anti-Malware Testing
Malware: Fighting Malicious Code
Measuring and Modeling Computer Virus Prevalence
A week is a long time in computer ethics
Code-Red: a case study on the spread and victims of an Internet worm
Viruses: That Intricate Yarn
On the Performance of Internet Worm Scanning Strategies
Network-level polymorphic shellcode detection using emulation
I love you
Prosecuting Computer Virus Authors: The Need for an Adequate and Immediate International Solution
Malicious Software
Inside the Slammer Worm
Sharpei Behaviour
A History Of Computer Viruses: Three Special Viruses
The Art of File Format Fuzzing
Viruses and Worms: The Inside Story
A Self-reproducing Analogue
A Sense of Self for Unix Processes
A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig
Classification of Packed Executables for Accurate Computer Virus Detection
IPA Computer Virus Survey 2000
Impact of Computer Viruses on Society
Mobile Malware Attacks and Defense
Using Support Vector Machine to Detect Unknown Computer Viruses
Nematodes - Beneficial Worms
A Cooperative Immunization System for an Untrusting Internet
Viral polymorphism
Running head: REVERSE ENGINEERING MALWARE
Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract)
Techniques virales avancées
Removing web spam links from search engine results
Email networks and the spread of computer viruses
How dumaru?
Danger! Deadly new computer viruses want to kill your PC
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits
Threat Intelligence Gathering, Malware Collection and Incident Response Proposal "Discover, Investigate and Report"
The biology of digital organisms
Computer viruses - the current state in Italy
Detecting masquerades using a combination of Na?ve Bayes and weighted RBF approach
Malware Analyst's Cookbook and DVD
Architecture of a Morphological Malware Detector
Modeling Computer Viruses
An intelligent PE-malware detection system based on association mining
Internet computer virus protection policy
A Parallel String Matching Engine for use in High Speed Network Intrusion Detection Systems
A fault tolerance approach to computer viruses
Mostly harmless
Viruses: a concern for all of us
Malware Detection
TTAnalyze A Tool for Analyzing Malware
Defense-In-Depth Against Computer Viruses
Countering Kernel Rootkits with Lightweight Hook Protection
There Are No Safe Virus Tests
Efficient quarantining of scanning worms: optimal detection and coordination
Inoculating SSH Against Address-Harvesting Worms
The Little Black Book of Computer Viruses
Mathematical Viruses
A framework for modelling trojans and computer virus infection
VX Reversing I, the basics
SinFP, unification of active and passive operating system fingerprinting
An OS Independent Heuristics-based Worm-containment System
The Application of Epidemiology to Computer Viruses
Supervisory control of malicious executables
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection
A Pact with the Devil
Viruses 101
Implementing and testing a virus throttle
A Network Worm Vaccine Architecture
Moving To Windows 2000
Evaluation of malware phylogeny modelling systems using automated variant generation
End-to-end security implementation for mobile devices using TLS protocol
Detecting Virus Mutations Via Dynamic Matching
Efficiency of Trusted Platform Module Against Computer Attacks
Prepared testimony and statement for the record on computer virus legislation
Crimeware: Understanding New Attacks and Defenses
Trap E-mail Address for Combating E-mail Viruses
Abstract Detection of Computer Viruses
Using biological models to improve innovation systems
Protection of Computer Systems from Computer Viruses: Ethical and Practical Issues
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition
Use of an "Attenuated" Computer Virus as a Mechanism for Teaching Epidemiology
Artificial Immune Systems and the Grand Challenge for Non-Classical Computation
Open Problems in Computer Virology
Hide'n'Seek? Anatomy of Stealth Malware
Biological Aspects of Computer Virology
Securing Instant Messaging
Rogue Computer Programs - Viruses, Worms, Trojan Horses and Time Bombs: Prank, Prowess, Protection or Prosecution?
Memory scanning under Windows NT
Using Formal Grammar and Genetic Operators to Evolve Malware
Research in Computer Viruses and Worms
Unknown Malcode Detection and the Imbalance Problem
Coping with Cabanas
Malware Detection using Statistical Analysis of Byte-Level File Content
Self-Nonself Discrimination in a Computer
On Callgraphs and Generative Mechanisms
Chamber of horrors
A Critical Look at the Regulation of Computer Viruses
Letter from the EICAR Chairman
Computer Viruses: A Global Perspective
Computer intrusions and attacks
Computer Viruses A Very Real Threat
Złapaliśmy wirusa!
Malicious origami in PDF
The Case for Beneficial Computer Viruses and Worms
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing
Artificial Immune System against Viral Attack
The Giant Black Book of Computer Viruses (2nd ed.)
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques
The geneology of malware
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Breaking the Lorez
COMPUTE!'s computer viruses
Conflict and the Computer: Information Warfare and Related Ethical Issues
An Epidemiological View of Worms and Viruses
Winning the Battles, Losing the War Rethinking Methodology for Forensic Computing Research
Classification and identification of malicious code based on heuristic techniques utilizing Meta languages
Hidden Rootkits in Windows
A Distributed Approach against Computer Viruses Inspired by the Immune System
Slack Space Sculpting the computer monsters -- virus inspiration
Polymorphing Software by Randomizing Data Structure Layout
Automated Defense from Rootkit Attacks
Code mutation techniques by means of formal grammars and automatons
On the role of the Facilitator in information security risk assessment
Selbstreproduktion bei programmen
Computer Viruses: Can It Happen At IU?
Information Assurance and the Information Society
A software authentication system for the prevention of computer viruses
Computer Viruses on the Loose
Peer-to-Peer Botnets: Analysis and Detection
Comparing Passive and Active Worm Defenses
Using Malware to Improve Software Quality and Security
Console viruses?
The Java mobile risk
Trojan White Paper
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance
Cryptography and Viruses
Malware comes of age: The arrival of the true computer parasite
BIRD: Binary Interpretation using Runtime Disassembly
Les virus informatiques: théorie, pratique et applications
VIRUS, Very Important Resource Under Siege
Hunting For Metamorphic
Computer Viruses and Related Threats
Computer abuse: vandalizing the information society
An Introduction to Intrusion-Detection Systems
A Public Health Approach to Preventing Malware Propagation
The Danger Theory and Its Application to Artificial Immune Systems
Analysis of rxbot
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
The Evolution of the Computer Virus
The More Things Change...
Drill Seeker
Malicious Cryptography - Exposing Cryptovirology
Exploiting an Antivirus Interface
Detecting worms through de-centralized monitoring
Heads or tails
Principles of a Computer Immune System
A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time
Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems
Intrusion Detection for Viruses and Worms
Opcodes as predictor for malware
Is virus writing really that bad?
Internet Quarantine: Requirements for Containing Self-Propagating Code
Zero-hour, Real-time Computer Virus Defense through Collaborative Filtering
An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code
Современные rootkit-технологии в Linux
Polymorphic and Metamorphic Malware Detection
File system driver filtering against metamorphic viral coding
Defending against Viruses and Worms
A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows
Malware: A Future Framework for Device, Network and Service Management
Superworms and Cryptovirology: a Deadly Combination
Worm: The First Digital World War
Computer Viruses and Ethics
The Latest Malware Threats Against Your PC
A Memory Symptom-based Virus Detection Approach
Multi-Stage Delivery of Malware
Contagion on the Internet
Taxonomy and Effectiveness of Worm Defense Strategies
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure
Malware Analyst's Cookbook and DVD
HIPAA and Information Security Policies
Zeroing in on Metamorphic Computer Viruses
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
Writing disassembler
Loathing Lupper in Linux
What's in a Name?
Identifying Malicious Code Through Reverse Engineering
EPOCalypse NOW!
Introduction to Network Self-defense: technical and judicial issues
MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications
Joint network-host based malware detection using information-theoretic tools
Anti-Spyware Coalition Definitions and Supporting Documents
Computer Viruses as a Threat to Home Users
Model-Based Analysis of Two Fighting Worms
Viruses and Lotus Notes:- Have the Virus Writers Finally Met Their Match?
Profiles in cyber courage #1: Fred Cohen
On the trade-off between speed and resiliency of Flash worms and similar malcodes
The Virus Underground
Effectiveness of Quarantine in Worm Epidemics
Shadow Walker - Raising The Bar For Rootkit Detection
The Computer Virus Culture
Distributed Worm Simulation with a Realistic Internet Model
Analysis of Web Application Worms and Viruses
On the defence notion
On Instant Messaging Worms, Analysis and Countermeasures [slides]
A theoretical model of differential social attributions toward computing technology: when the metaphor becomes the model
"Все лгут". Погоня за истиной при поиске руткитов
Prophet and loss
Should We Teach Virus Writing?
Fighting EPO Viruses
Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms
Malware Detection Using Adaptive Data Compression
Worm Epidemics in High-Speed Networks
Computer Immunology(Lau)
Corporate Virus Protection
New threats of Java viruses
What's the difference between a Virus, Worm, and Trojan horse?
Not Teaching Viruses and Worms Is Harmful
The Case for Using Layered Defenses to Stop Worms
Applied parallel coordinates for logs and network traffic attack analysis
Virus detection using datamining techniques
TAU cure for computer viruses?
Virus Spread in Networks
Constructing Malware Normalizers using Term Rewriting
Considering the potential of criminal profiling to combat hacking
On the Time Complexity of Computer Viruses
Virus Verification and Removal Tools and Techniques
Development of inland lakes as hubs in an invasion network
Des IDS et des vers... Détection par l'analyse statistique : de la théorie à la pratique ?
Not worthy
Analyzing Worms and Network Traffic using Compression
Malicious Threats to Personal Digital Assistants
The Asexual Virus: Computer Viruses in Feminist Discourse
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
Email Virus Propagation Modeling and Analysis
Defeating Polymorphism: Beyond Emulation
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint
Virtual Honeypots - From Botnet Tracking to Intrusion Detection
Using Engine Signature to Detect Metamorphic Malware
Компьютерные вирусы-92: от плохого к худшему, или Есть ли вирусы на Марсе?
Убить дракона
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration
Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses
On Effectiveness of Defense Systems against Active Worms
Internet - Virusnet?
Sobig, sobigger, sobiggest
Infection dynamics on scale-free networks
Something smells fishy
Rootkits - The new wave of invisible malware is here
A Sense of 'Danger' for Windows Processes
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction
Computer Virus__
"Computer Viruses" Episode
Reductions of the general virus detection problem
Queuing theory based models for studying intrusion evolution and elimination in computer networks
A History Of Computer Viruses - Introduction
Rootkit detection from outside the Matrix
Using a virtual security testbed for digital forensic reconstruction
A Plague of Viruses: Biological, Computer and Marketing
On abstract computer virology from a recursion theoretic perspective
The Giant Black Book of Computer Viruses
The Code of Life: A look at emerging Artificial Life
Concepts and Future Trends in Computer Virology
Metamorphic Virus: Analysis and Detection
Анализ результатов первого турнира по компьютерной игре «Бой в памяти»
Epidemic dynamics and endemic states in complex networks
Parallels Between Biological and Computer Epidemics
Infection dynamics on the Internet
Malware phylogeny generation using permutations of code
Computer viruses: a quantitative analysis
The motivation behind computer viruses
Concepts of cooperation in artificial life
Classification of Computer Viruses Using the Theory of Affordances
Computer Virus Survival Guide
Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis
Faster parameter detection of polymorphic viral binary code using hot list strategy
Where have the worms and viruses gone? - new trends in malware
Computer Viruses - A Form of Artificial Life?
Spyware: A Little Knowledge is a Wonderful Thing
Spyware and Adware
Specification and evaluation of polymorphic shellcode properties using a new temporal logic
Implementing and Detecting an ACPI BIOS Rootkit
A unified prediction of computer virus spread in connected networks
TAMAP a new trust-based approach for mobile agent protection
COMPUTER VIRUS: FUTURE CYBER WEAPONS
Worm wars
USC-OIA Special Virus Report
How good is good enough Metrics for wormanti-worm evaluation
Source Code Analysis of Worms
High Anxiety
Some human dimensions of computer virus creation and infection
Parvo - One Sick Puppy?
Incorporating E-Commerce, Internet and Telecommunications Security
Convergence of Virus Writers and Hackers: Fact or Fantasy?
Constructing malware normalizers using term rewriting
MetaAware: Identifying Metamorphic Malware
Advanced Routing Worm and Its Security Challenges
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Virus Writers 360
Predators: Good Will Mobile Codes Combat against Computer Viruses
Viruses Are Beginning to Get to Me!
The dynamics of computer virus infection
Nexiv_Der: Tracing the Vixen
Challenges in getting 'formal' with viruses
PC Magazine Fighting Spyware Viruses and Malware
A Formal Definition of Computer Worms and Some Related Results
Virus Trends 2003-2004
Mathematical models on computer viruses
When Malware Meets Rootkits
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance
Bot countermeasures
Computer Viruses: the Inevitability of Evolution?
Internet Quarantine: Requirements for Containing Self-Propagating Code
Next-Generation Viruses Present New Challenges
Using Qualia and Hierarchical Models in Malware Detection
Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the Bradley Virus
Control Flow to Detect Malware
A Hygiene Lesson
How Viruses Spread among Computers and People
Virus ex machina res ipsa loquitur
Distributed Computing with a Trojan Horse
Taking the redpill: Artificial Evolution in native x86 systems
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Antivirus update reaction times of major antivirus vendors
Malware: Fighting Malicious Code
Detecting (and creating !) a HVM rootkit (aka BluePill-like)
Defending against Hitlist Worms using Network Address Space Randomization
In-depth analysis of the viral threats with OpenOf#ce.org documents
Jak pisać wirusy
Automatic Extraction of Computer Virus Signatures
The Bulgarian and Soviet Virus Factories
Malware behaviour analysis
Unpredictable Legacies: Viral Games in the Networked World
Using Virtualisation to Protect Against Zero-Day Attacks
Virus als Metapher
Computer Viruses: The Technology and Evolution of an Artificial Life Form
Trojans Worms and Spyware: A Computer Security Professional's Guide to Malicious Code
Hunting for Metamorphic Engines
Scalable, Behavior-Based Malware Clustering
Computer Viruses as Artificial Life
Formal Models of Reproduction: from Computer Viruses to Artificial Life
Broadband Network Virus Detection System Based on Bypass Monitor
The Emergence of the Posthuman Consumer and the Fusion of the Virtual and the Real
The Role of Internet Service Providers in Botnet Mitigation An Empirical Analysis Based on Spam Data
Computer "Insecurity" and Viral Attacks: Liability Issues Regarding Unsafe Computer Systems Under Quebec Law
Taking a Lesson from Stealthy Rootkits
Digital Postmark Helps Fight Spam, Virus Attacks
Bad Transfer
Using Code Normalization for Fighting Self-Mutating Malware
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
Automated Malware Invariant Generation
Tricky Relocations
Accuracy improving guidelines for network anomaly detection systems
DarkMarket: cyberthieves, cybercops and you
Evolvable Malware
A Taxonomy of Computer Worms
Honeypots against Worms 101
You've got more M(1**)A(D)I(L+K)L
Virentechniken: Analyse und Metamorphismus
A general definition of malware
Le malware en 2005 %96 Unix, Linux et autres plates-formes
The Evolving Virus Threat
Malware Pattern Scanning Schemes Secure Against Black-box Analysis
Generic Virus Scanner in C++
Evaluation of Two Host-Based Intrusion Prevention Systems
Functional similarities between computer worms and biological pathogens
The "Worm" Programs - Early Experience with a Distributed Computation
Detection of metamorphic and virtualization-based malware using algebraic specification
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations
Computer Viruses, Epidemiology and Worms
Improving security and performance of an Ad Hoc network through a multipath routing strategy
Enhancing web browser security against malware extensions
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector
Deelaed learning
Potential Threats to WAP Enabled Devices
Collaborative Defense Against Zero-Day and Polymorphic Worms: Detection, Response and an Evaluation Framework
Transaction pseudonyms in mobile environments
Formal affordance-based models of computer virus reproduction
VT Integrity Services for Networking
Tumours and polips
The worm that turned: A social use of computer viruses
'Holey' virus, Batman!
Learning from Experience
Viruses and Worms
Combating computer viruses
Revealing Packed Malware
Malware as interaction machines a new framework for behavior modelling
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection
Nimda Worm Shows You Can't Always Patch Fast Enough
A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed
Malicious Codes in Depth
Ani-hilate this week
Stealth malware analysis from kernel space with Kolumbo
$$$_+$$+$$__+_$+$$_$+$$$_+$$_$
Data security from malicious attack: Computer Virus
On the possibility of practically obfuscating programs
How to assess the effectiveness of your anti-virus?
Information warfare and security
An epidemiological model of virus spread and cleanup
Unknown Malcode Detection via Text Categorization and the Imbalance Problem
Worm Defense System for Enterprise Networks
Taiwan's first ever political computer virus
Viruses Are Not Speech
Rootkit Hunting vs. Compromise Detection
Trends in Viruses and Worms
Formal Affordance-based Models of Computer Virus Reproduction
Acquisition of Malicious Code Using Active Learning
The future of virus detection
Self-Replicating Turing Machines and Computer Viruses
Backdoors et rootkits avancés
Dynamic Analysis of Malicious Code
The Basic Building Blocks of Malware
Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism
Control Flow Graphs as Malware Signatures
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)
Powerful virus hits computers
Managing university internet access balancing the need for security, privacy and digital evidence
Feedback Email Worm Defense System for Enterprise Networks
An Evaluation of Two Host Based Intrusion Prevention Systems
Paradise lost
Blast off!
Panic computing: The viral metaphor and computer technology
On the Spread of Viruses on the Internet
Turing Machines and Undecidability with Special Focus on Computer Viruses
Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited?
Detection of New Malicious Code Using N-grams Signatures
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Code Red Buffer Overflow
Let them eat brioche
The Marburg Situation
Cheating the ELF Subversive Dynamic Linking to Libraries
Computer Viruses By Ingrid Richter
A Method for Detecting Obfuscated Calls in Malicious Binaries
Computer Viruses for Dummies
Virus Bénéfiques
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus
Computer Viruses: The Threat Today and The Expected Future
A Classification of Viruses through Recursion Theorems
Worm Epidemiology
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior
Looking a Bagift-Horse in the Mouth
Computer doctor busy fighting `viruses'
Computer viruses demystified
Let free(dom) Ring!
Computer virus immunization
A Theoretical Superworm
Cr´ation d'un "Web Worm"
Response to the Proposal for a "C-Virus" database
Modeling Malware Spreading Dynamics
Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
To catch Efish
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms
Trapping Viruses
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
An N-Gram and STF-IDF model for masquerade detection in a UNIX environment
Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"` by E. Makinen
Code obfuscation techniques for metamorphic viruses
Virus Protection
A boosting ensemble for the recognition of code sharing in malware
The WiT virus: A virus built on the ViT ELF virus
Understanding Virus Behavior in 32-bit Operating Environments
Normalizing Metamorphic Malware Using Term Rewriting
Determining malicious executable distinguishing attributes and low-complexity detection
WORM AND VIRUS DEFENSE: HOW CAN WE PROTECT THE NATION'S COMPUTERS FROM THESE THREATS?
Internet Instability and Disturbance: Goal or Menace?
Misleading Modern Malware
The Impact of Computer Viruses on Society
Epidemics and immunization in scale-free networks
AVIEN Malware Defense Guide for the Enterprise
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents
IDS alerts correlation using grammar-based approach
Design of a neural network for recognition and classification of computer viruses
Computer Immunology
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings
A Mathematical Theory for the Spread of Computer Viruses
ACPI and SMI handlers some limits to trusted computing
Attacks on Win32 - Part II
Metamorphism, Formal Grammars and Undecidable Code Mutation
Extended recursion-based formalization of virus mutation
Shield -- A First Line Worm Defense
The Virtual Artaud: Computer Virus as Performance Art
Comments on a paper by Voas, Payne & Cohen: “A model for detecting the existence of software corruption in real time”
The Design Space of Metamorphic Malware
On abstract computer virology from a recursion-theoretic perspective
Future Trends in Malicious Code - 2006 Report
A Worst-Case Worm
The wormpipe strikes back
The Brains Behind the Operation
Botnetsand Applications
Can you be held civilly liable for spreading computer viruses?
Improving antivirus accuracy with hypervisor assisted analysis
The Rise of AutoRunBased Malware
The "Worm" Programs--Early Experience with a Distributed Intelligence
Malware analysis for windows administrators
Functional polymorphic engines: formalisation, implementation and use cases
The Norman Book on Computer Viruses
Technologically Enabled Crime: Shifting Paradigms for the Year 2000
Anti-Malware Tools: Intrusion Detection Systems
Virii Generators: Understanding the Threat
Epidemiological Modelling of Peer-to-Peer Viruses and Pollution
Worm Analysis through Computer Simulation
Polymorphic virus detection technology
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification
Spyware and Rootkits - The Future Convergence
COMPUTER VIRUSES: PREVENTION, DETECTION, AND TREATMENT
Experience with Viruses on UNIX Systems
Anti-Virus Product Evaluation in the Real World
Killer Apps
Flying below the Radar: What modern malware tells us
Crisis and Aftermath
Are Metamorphic Viruses Really Invincible?
ASM-based Modelling of Self-Replicating Programs
The Pathology of Computer Viruses
The Future of Malware
VirusMeter: Preventing Your Cellphone from Spies
Are current antivirus programs able to detect complex metamorphic malware? An empirical evaluation
Challenges Of Modeling BotNets For Military And Security Simulations
The Dangers of Computer Viruses: Implications for 21st Century Educators
"Good" Worms and Human Rights
Advances in password cracking
Tasting Donut
Computer virus cover withdrawn
E-mail virus protection handbook
Some Further Theoretical Results about Computer Viruses
Rootkits Analysis and Detection
Can cryptography prevent computer viruses?
Linux Improvised Userland Scheduler Virus
Implementing Anti-Virus Controls in the Corporate Arena
Static detection and identification of X86 malicious executables: A multidisciplinary approach
Virus attack - how computer networks could heal themselves
Opcodes as Predictor for Malware
Virus Writers: The End of The Innocence?
Worm Anatomy and Model
Macro virus identification problems
Viruses Revealed: Understanding and Counter Malicious Software
Virus authors faster to the kill
Ethical Issues in Computer Virus Distribution
Malicious crypto - (Ab)use cryptology
Two Bills Equal Forewarning
Cryptovirology: Extortion-Based Security Threats and Countermeasures
Антивирусные программы
Countering NetworkWorms Through Automatic Patch Generation
Linux 2.6 kernel exploits
An Efficient Control of Virus Propagation
On JavaScript Malware and related threats
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
Automatic Reverse Engineering of Malware Emulators
Are Handheld Viruses a Significant Threat?
Toward an abstract computer virology
Advanced Code Evolution Techniques and Computer Virus Generator Kits
Model for network behaviour under viral attack
Fast virus detection by using high speed time delay neural networks
Detecting Kernel-Level Rootkits Through Binary Analysis
Modern Methods of Detecting and Eradicating Known and Unknown Viruses
COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY
Towards Systematic Evaluation of the Evadability of Bot,Botnet Detection Methods
Scary Networks? Viruses as Discursive Practice
Parallel analysis of polymorphic viral code using automated deduction system
From AntiVirus to AntiMalware Software and Beyond
Functional polymorphic engines formalisation, implementation and use cases
An Approach to Containing Computer Viruses
Detecting Unknown Massive Mailing Viruses Using Proactive Methods
Heliza talking dirty to the attackers
Reflections on Trusting Trust
Computer Viruses and What to Do About Them
Malicious Cryptography: Cryptovirology and Kleptography
Using Entropy Analysis to Find Encrypted and Packed Malware
The Impact of Countermeasure Spreading on the Prevalence of Computer Viruses
Malware and steganography in hard disk firmware
Computer Viruses Are Nothing New Don't be ashamed
Epidemiological Models Applied to Viruses in Computer Networks
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Imitation of Life: Advanced system for native Artificial Evolution
Computer Viruses: an executive overview
IpMorph fingerprinting spoofing unification
Bolzano Bugs NT
Bologna process revisited educating information security and malware experts
A parallel "String Matching Engine" for use in high speed network intrusion detection systems
Morphological Detection of Malware
Computer Worms: Past, Present, and Future
Computer Virus Strategies and Detection Methods
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS
About malicious software in smartphones
Visualizing Windows Executable Viruses Using Self-Organizing Maps
Spyware & Rootkits
The Bite of the Computer Virus
Monitoring and Early Warning for Internet Worms
Look at that escargot
Immunity-Based Intrusion Detection System: A General Framework
Referees 2006
Mimimorphism: A New Approach to Binary Code Obfuscation
Implementation of a Computer Immune System for Intrusion- and Virus Detection
Server-based Virus-protection On Unix\Linux
A spatial stochastic model for worm propagation scale effects
Survey on Malware Detection Methods
Contournement d%92une passerelle antivirus
The Bulgarian Computer Virus Factory
Junkie Memorial?
Computer Viruses - Theory and Experiments
Hunting for metamorphic
The Cornell Commission: On Morris and the Worm
Simulating and optimising worm propagation algorithms
Netware execute only attribute - considered harmful
Got [Mac]root?
A Tour of the Worm
Effective and Inexpensive Methods Exist for Controlling Software Viruses
Biological versus Computer Viruses
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment
Windows memory forensics
Recent Worms: A Survey and Trends
The Virus Hunter
GETTING THE WORD OUT
Viral Evolution
A Potency Relation for Worms and Next-Generation Attack Tools
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Malware detection using assembly and API call sequences
La "mobilité" du code malveillant
Anti-disassembly using Cryptographic Hash Functions
Malware Normalization
Computer viruses (BMJ 302-66e)
Why Anti-Virus Software Cannot Stop the Spread of Email Worms
Tools for Finding and Removing Rootkits
Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs
64-bit rugrats
A Dozen Dangerous Myths About Computer Viruses
It's zell(d)ome the one you expect
Defense and Detection Strategies against Internet Worms
Synners
When Java Was One: Threats From Hostile Byte Code
Practical Detection of Metamorphic Computer Viruses
Sandbox Technology Inside AV Scanners
Is creating virus software protected as a first amendment right?
Controlling Super-Intelligent Machines
Modeling the Spread of Active Worms
Antivirus Software Testing for the New Millenium
Viral Style: Technology, Culture, and the Politics of Infection
Darwin, a Game of Survival of the Fittest among Programs
An Approach towards Disassembly of Malicious Binary Executables
Sleep-Inducing
On the possibility of practically obfuscating programs towards a unified perspective of code protection
Code Red Worm Propagation Modeling and Analysis
HPS
Fighting Computer Viruses
Do-It-Yourself Guide to Cell Phone Malware
The road less truvelled
Windows Rootkit Overview
Modeling the Effects of Timing Parameters on Virus Propagation
Static Detection of Malicious Code in Executable Programs
Intrusion detection and virology an analysis of differences, similarities and complementariness
Making a hash of things
JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC
Malware pattern scanning schemes secure against black-box analysis
As Japanese Bring Work Home, Virus Hitches a Ride
History of Viruses & Worms
Static Analysis of Binary Code to Isolate Malicious Behaviors
Mathematical Model of Computer Viruses
A Framework to Detect Novel Computer Viruses via System Calls
Analysis of a scanning model of worm propagation
A Hybrid Model to Detect Malicious Executables
TheV-Files: A dictionary of file threats
Trends of Spyware, Viruses and Exploits
Timing Rootkits
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection
Using Plant Epidemiological Methods To Track Computer Network Worms
Reliable Identification of Bounded-length Viruses is NP-complete
Becoming Positive
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation
Dynamic Binary Instrumentation-based Framework for Malware Defense
Immunization and epidemic dynamics in complex networks
Leaps and Bounds
Virus Tutorial
Web Sites Hawk Instructions On Making Computer Viruses
Fast Detection of Scanning Worm Infections
Understanding Computer Viruses
Malicious Cryptography: Kleptographic Aspects
Young Nussbaum Monin PSPB 2007
RFID Security Issues in Military Supply Chains
IpMorph: fingerprinting spoofing unification
Computers and epidemiology
Detecting Metamorphic Computer Viruses using Supercompilation
Biological Models of Security for Virus Propagation in Computer Networks
The Evolution of Viruses and Worms
Autoimmune viruses
High-Fidelity Modeling of Computer Network Worms
Examining Viruses
Rebels for the System? Virus writers, general intellect, cyberpunk and criminal capitalism
The metamorphosis of malware writers
Computer viruses and electronic mail
Ukrainian-Russian Hackers the Stealth Group and Its Leader, LovinGOD
Modular worms
Introduction to Network Self-defense technical and judicial issues
New malware distribution methods threaten signature-based AV
Worms of the future
Approaches to Integrated Malware Detection and Avoidance
Botnet Detection: Countering the Largest Security Threat
Defense Against the Dark Arts
Computer "virus" identification by neural networks
Virology 101
Epidemic Profiles and Defense of Scale-Free Networks
Time machine
Beyond Layers and Peripheral Antivirus Security
The Costly Implications of Consulting in a Virus-Infected Computer Environment
The Virus is Worse than the Cure
Applications of Genetic Algorithms to Malware Detection and Creation
A Failure to Learn from the Past
AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION
Computer Virus-Antivirus Coevolution
Infection, imitation and a hierarchy of computer viruses
The Computer Virus -- From There to Here
Software Diversity as a Defense Against Viral Propagation: Models and Simulations
The ABC of computer security
Attacks on Win32
The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses
Обнаружение руткитов режима ядра с помощью отладчика
Rotalum: A Tool for Automatic Reverse Engineering of Malware Emulators
Polymorphic Worm Detection Using Structural Information of Executables
Viruses in France: The French Connection - II
Hunting Obfuscated Malwares by Abstract Interpretation
Reverse Code Engineering: An In-Depth Analysis of the Bagle Virus
Suppressing the Spread of Email Malcode using Short-term Message Recall
Can you spare a seg?
One-hit models for virus inactivation studies
Simulating Bandwidth-Limited Worms, One Graph to Rule Them All?
Harmless and Useful Viruses Can Hardly Exist
Shelling Out
Static analysis by abstract interpretation application to the detection of heap overflows
A Virtual Honeypot Framework
Hash-AV: Fast Virus Signature Scanning by Cache-Resident Filters
The Real Cost of a Virus Outbreak
Detecting Unknown Computer Viruses
Вирусы в СССР
Polygraph: Automatically Generating Signatures for Polymorphic Worms
Hidan and dangerous
Un combate con el Kerñado
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection
Viral Attacks On UNIX System Security
Doin' the eagle rock
SirCamstantial Evidence
The Race Against Malicious Software
Catch Me If You Can
Testing Time for Antivirus Software
Poison Ivy Farmers: Virus Collections
The impact of Microsoft Windows infection vectors on IP network traffic patterns
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots
A note on Cohen's formal model for computer viruses
Formalisation and implementation aspects of K -ary (malicious) codes
White-box attack context cryptovirology
Worm Detection Using Local Networks
An Email Worm Vaccine Architecture
Darwin
Profile hidden Markov models and metamorphic virus detection
Detecting metamorphic viruses using profile hidden markov models
Abstraction-Based Intrusion Detection In Distributed Environments
Viral Bodies, Virtual Practices
A Web-Based Network Worm Simulator
Malware Forensics: Investigating and Analyzing Malicious Code
On the adaptive real-time detection of fast-propagating network worms
A Survey of Cryptologic Issues in Computer Virology
How to Kill Worms and Viruses with Policy Pontifications
Ethereal, un analyseur ré seau à usages multiples
A Short Course on Computer Viruses
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings
Testing Malware Detectors
The Blaster Worm - The View from 10,000 feet
On the Effectiveness of Address-Space Randomization
I've named my virus - now what do I win?!
Пишем вирус... и антивирус для IBM-совместимых компьютеров
Impeding Malware Analysis Using Conditional Code Obfuscation
Pairwise alignment of metamorphic computer viruses
Are computer viruses spread by the media?
AGIS: Towards Automatic Generation of Infection Signatures
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
When Computer Viruses Strike
ELF et virologie informatique
Do The Media Spread Computer Viruses
Measurement and Analysis of Worm Propagation on Internet Network Topology
Non-signature based virus detection
Reports of computer viruses on the increase
Anatomy of a Semantic Virus
Hunting for metamorphic engines
Disk-Level Behavioral Malware Detection
Signature Generation and Detection of Malware Families
Are Computer Hacker Break-ins Ethical?
Malware Research at SMU
With Microscope and Tweezers: The Worm from MITS Perspective
Stay Safe Online Campaign's AntiVirus Presentation
Computer Parasitology
COMPUTER VIRUSES AND CIVIL LIABILITY: A CONCEPTUAL FRAMEWORK
Unknown malcode detection and the imbalance problem
Static Analysis of Executables to Detect Malicious Patterns
Set-up and deployment of a high-interaction honeypot experiment and lessons learned
API Win32 ancestrales pour Chevaux de Troie hyper furtifs
Self-reproducing machines
Mechanics of Self-reproduction
Development of Computer Vulnerability Scanning Scanning Workgroup
Anti-Disassembly using Cryptographic Hash Functions
An Epidemic Model of Mobile Phone Virus
The Future of Bot Worms
Creating a Secure Computer Virus Laboratory
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
Developing a Trojan applets in a smart card
Is Your Cat Infected with a Computer Virus?
Detecting Malicious Code by Model Checking
Eigenviruses for metamorphic virus recognition
The Art of Computer Virus Research and Defense
Malware
Computer Virus Propagation Models
Viruses & spam fuel new laws
Automated Worm Fingerprinting
Regular expression matching with input compression a hardware design for use within network intrusion detection systems
Combinatorial Optimisation of Worm Propagation on an Unknown Network
Analysis and detection of metamorphic computer viruses
Malware of the Future
Attack of the quantum worms
Stochastic Features of Computer Viruses
Malicious crypto
On behavioral detection
Computer virus prevention: a primer
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
Stream of Consciousness
Stoned Bootkit
The Future of Internet Worms
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet
Advanced Polymorphic Techniques
The Social Psychology of Computer Viruses and Worms
Anomalous Payload-based Network Intrusion Detection
The Cuckoo's Egg
DCA for Bot Detection
THE MALICIOUS LOGIC BATTLE: UNDERSTANDING THE ENEMY
The Internet Worm: Crisis and Aftermath
Attack of the Clones
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
Viruses and Worms: The Best Defense is Awareness
How to Withstand Mobile Virus Attacks
Computer Security Analysis through Decompilation and High-Level Debugging
A Semantics-Based Approach to Malware Detection
Rootkits - Detection and prevention
Concepts for the Stealth Windows Rootkit (The Chameleon Project)
Metaphors And Meta-Experiences In Technology Side Effects: A Multimedia Exhibit
The Bigger Picture
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD: VIRUSES AND COMPUTERS
Design of a System for Real-Time Worm Detection
Winning the battles, losing the war? Rethinking methodology for forensic computing research
Computer Viruses, Epidemiology, and Worms
Anomalous Payload-based Worm Detection and Signature Generation
The Shockwave Rider
Semi-automatic binary protection tampering
High-Performance Context-Free Parser for Polymorphic Malware Detection
ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS
Gatt got your tongue?
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging
Models of Active Worm Defenses
A History Of Computer Viruses - The Famous `Trio'
VX Reversing II, Sasser.B
The Risk of Debug Codes in Batch: what are debug codes and why they are dangerous?
Characterization of virus replication
The Legislative Response to the Evolution of Computer Viruses
В игре «Бой в памяти» компьютерные программы ведут битву за биты
A Computer Virus Is A Thought Manifested
Open Problems in Computer Virus Research
Botnets: The Killer Web App
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
Know Your Enemy: Containing Conficker
Detecting self-mutating malware using control-flow graph matching
The Java Mobile Risk
Rootkit modeling and experiments under Linux
SBMDS an interpretable string based malware detection system using SVM ensemble with bagging
Testing and evaluating virus detectors for handheld devices
Cabirn fever
CPU bugs, CPU backdoors and consequences on security
Advanced fuzzing in the VoIP space
Quantum Malware
Towards Automated Defense from Rootkit Attacks
Modern operating systems
On the definition and classification of cybercrime
The malware naming chaos
Virus Prevention, Cure and Hoaxes
Legal Options To Computer Viruses
Computer viruses: from theory to applications
Backdoors et rootkits avancés [SLIDES]
New data mining technique to enhance IDS alarms quality
Defending Against Internet Worms: A Signature-Based Approach
Software transformations to improve malware detection
Malicious Software in Mobile Devices
Real-Time Virus Detection System Using iNetmon Engine
The Spam Book: On Viruses, Porn and Other Anomalies From the Dark Side of Digital Culture
Авторан на халяву
Effectiveness of Rate Control in Slowing Down Worm Epidemics
Automated Classification and Analysis of Internet Malware
Attack of the killer virus!
Towards an undetectable computer virus
An Internet-Worm Early Warning System
The "Father Christmas worm"
B-tree with fixed node size and no minimum degree
Detecting Windows Server Compromises with Patchfinder 2
Virology_101(Usenix)
Anonymous and Malicious
Dynamical Models for Computer Viruses Propagation
Advanced Metamorphic Techniques in Computer Viruses
Анализ руткита TDSS
Automatically generated Win32 heuristic virus detection
Virus Detection System - VDS
Olivia
A Technique for Removing an Important Class of Trojan Horses from High Order Languages
Blueprint for a Computer Immune System
Cain and Abul
System Dynamic Model for Computer Virus Prevalance
A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses
Measuring virtual machine detection in malware using DSD tracer
PROTECTION OF COMPUTER SYSTEMS FROM COMPUTER VIRUSES: ETHICAL AND PRACTICAL ISSUES
A statistical model for undecidable viral detection
Mobile Code Threats, Fact or Fiction
Computer Virus Operation and New Directions
Slamdunk
A Study of Malcode-Bearing Documents
The Invirsible Man
Distributive immunization of networks against viruses using the `honey-pot' architecture
Resolution based metamorphic computer virus detection using redundancy control strategy
Twinkle, twinkle little star
The solution in the naming chaos
Viruses and Worms--What Can You Do?
Contagion and Repetition: On the Viral Logic of Network Culture
Testing the SETIHacker Hypothesis
Avoiding Windows Rootkit Detection
Malware, Viruses and Log Visualisation
A Generic Virus Scanner in C++
The Engine of the Underground: The Elite-Kiddie Divide
Crimea river
The SASSER Event: History and Implications
Cryptographic Hashing for Virus Localization
Unknown Malicious Code Detection # Practical Issues
Computer Virus Identification and Prevention
Applications of Immune System Computing
Suppressing the spread of email malcode using short-term message recall
Viruses using .NET Framework
Warnings of a Dark Future: The Emergence of Machine Intelligence
Efficient Virus Detection Using Dynamic Instruction Sequences
Possible Vicarious Liability for Computer Users in the USA?
Stealth Survival
ARTIST: A Network for ARTifical Immune SysTems
Detecting Internet Worms Using Data Mining Techniques
Flibi: Evolution
Procedures To Reduce The Computer Virus Threat
The missing LNK
Flibi: Reloaded
PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS
Malware Phylogeny Generation using Permutations of Code
Callgraph properties of executables
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures
Flibi night
Utilizing Entropy to Identify Undetected Malware
An Abstract Theory of Computer Viruses
The Internet Worm Incident
Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection
Computer viruses (BMJ 299-66a)
Structuring ethical curricula in the information age
Language, a virus?
On callgraphs and generative mechanisms
Malware a future framework for device, network and service management
Using Verification Technology to Specify and Detect Malware
Treating scalability and modelling human countermeasures against local preference worms via gradient models
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
Dynamic analysis of malicious code
Raised hacklez
Painting the Internet: A Different Kind of Warhol Worm
Обзор читательских откликов на статьи, посвященные игре «Бой в памяти»
Metaphors and Modern Threats: Biological, Computer, and Cognitive Viruses
The Code Red Worm
On Abstract Computer Virology from a Recursion Theoretic Perspective
Adequacy of Checksum Algorithms for Computer Virus Detection
Flying solo
Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"` by E. Makinen - Thimbleby
A pilot study on college student's attitudes toward computer virus
Detecting Worms via Mining Dynamic Program Execution
New thoughts in ring3 NT rootkit
Internet attacks monitoring with dynamic connection redirection mechanisms
Fragmented malware through RFID and its defenses
On Computer Viral Infection and the Effect of Immunization
A Framework for Deception
Formalization of viruses and malware through process algebras
N-gram-based Detection of New Malicious Code
Limits of Static Analysis for Malware Detection
Magisterium Abraxas
You've got M(1**)a(D)i(L+K)l
Constructing Computer Virus Phylogenies
Computer Viruses and the Simulation Environment WiCE
Equational reasoning を用いた obfuscated decipher routine のパラメータ検出
Filter-resistant code injection on ARM
Analysis of Virus Algorithms
Efficient Content-Based Detection of Zero-Day Worms
Computer viruses and anti-virus warfare
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
Computer Viruses and Their Control
The Ecology of Malware
Thoughts about Cross-View based Rootkit Detection
Detection of Self-Mutating Computer Viruses
Enforcing kernel constraints by hardware-assisted virtualization
How the virus "Remote Shell Trojan" (RST) works
Abstracts of Recent Articles and Literature
Computer Virus Operation and New Directions-1997
Modeling Epidemic Spreading in Mobile Environments
Windows Rootkits
Software Vaccine Technique and Its Application in Early Virus Finding and Tracing
Do the macarena
SQL infections through RFID
How To Withstand Mobile Virus Attacks
Computer Virus Myths
Binary Obfuscation Using Signals
Database Rootkits
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques
Chiba witty blues
The New 32-bit Medusa
Anti-disassembly using cryptographic hash functions
Analysis and Detection of Computer Viruses and Worms
A study of anti-virus' response to unknown threats
Computer-Generated Life
Detection of metamorphic computer viruses using algebraic specification
Architecture of a morphological malware detector
Computer Viruses, Artificial Life and Evolution
System and method for detecting malicious executable code
Formal Definition of Self-reproductive Systems
What is Wild?
Unexpected Resutls [sic]
Prescription Medicine
Computer Malware: What You Don't Know Can Hurt You
SPARSE: A Hybrid System to Detect Malcode-Bearing Documents
Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses
Countering Network Worms Through Automatic Patch Generation
How to Assess the Effectiveness of your Anti-virus
Hunting for undetectable metamorphic viruses
Managing Computer Viruses in a Groupware Environment
N-gram analysis for computer virus detection
Small treatise about e-manipulation for honest people
A Short Visit to the Bot Zoo
Viruses and the Law
Computer viruses (BMJ 307-59e)
Improving Malware Detection by Applying Multi-Inducer Ensemble
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code
Implicaçoes da ofuscaçao de código no desenvolvimento de detectores de código malicioso
Host-Based Detection of Worms through Peer-to-Peer Cooperation
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings
Poetry in Motion
Computer virus prevention and containment on mainframes
Comparative analysis of various ransomware virii
Discovering and exploiting 802.11 wireless driver vulnerabilities
An Overview of Computer Viruses in a Research Environment
The Challenge of Being Prepared for Tomorrow%92s MalWare Today
A Bypass of Cohen's Impossibility Result
Virus Bulletin
1989 July, 1989
Table of Contents
August, 1989
Table of Contents
September, 1989
Table of Contents
October, 1989
Table of Contents
November, 1989
Table of Contents
December, 1989
Table of Contents
1990 January, 1990
Table of Contents
February, 1990
Table of Contents
March, 1990
Table of Contents
April, 1990
Table of Contents
May, 1990
Table of Contents
June, 1990
Table of Contents
July, 1990
Table of Contents
August, 1990
Table of Contents
September, 1990
Table of Contents
October, 1990
Table of Contents
November, 1990
Table of Contents
December, 1990
Table of Contents
1991 January, 1991
Table of Contents
February, 1991
Table of Contents
March, 1991
Table of Contents
April, 1991
Table of Contents
May, 1991
Table of Contents
June, 1991
Table of Contents
July, 1991
Table of Contents
August, 1991
Table of Contents
September, 1991
Table of Contents
October, 1991
Table of Contents
November, 1991
Table of Contents
December, 1991
Table of Contents
1992 January, 1992
Table of Contents
February, 1992
Table of Contents
March, 1992
Table of Contents
April, 1992
Table of Contents
May, 1992
Table of Contents
June, 1992
Table of Contents
July, 1992
Table of Contents
August, 1992
Table of Contents
September, 1992
Table of Contents
October, 1992
Table of Contents
November, 1992
Table of Contents
December, 1992
Table of Contents
1993 January, 1993
Table of Contents
February, 1993
Table of Contents
March, 1993
Table of Contents
April, 1993
Table of Contents
May, 1993
Table of Contents
June, 1993
Table of Contents
July, 1993
Table of Contents
August, 1993
Table of Contents
September, 1993
Table of Contents
October, 1993
Table of Contents
November, 1993
Table of Contents
December, 1993
Table of Contents
1994 January, 1994
Table of Contents
February, 1994
Table of Contents
March, 1994
Table of Contents
April, 1994
Table of Contents
May, 1994
Table of Contents
June, 1994
Table of Contents
July, 1994
Table of Contents
August, 1994
Table of Contents
September, 1994
Table of Contents
October, 1994
Table of Contents
November, 1994
Table of Contents
December, 1994
Table of Contents
1995 January, 1995
Table of Contents
February, 1995
Table of Contents
March, 1995
Table of Contents
April, 1995
Table of Contents
May, 1995
Table of Contents
June, 1995
Table of Contents
July, 1995
Table of Contents
August, 1995
Table of Contents
September, 1995
Table of Contents
October, 1995
Table of Contents
November, 1995
Table of Contents
December, 1995
Table of Contents
1996 January, 1996
Table of Contents
February, 1996
Table of Contents
March, 1996
Table of Contents
April, 1996
Table of Contents
May, 1996
Table of Contents
June, 1996
Table of Contents
July, 1996
Table of Contents
August, 1996
Table of Contents
September, 1996
Table of Contents
October, 1996
Table of Contents
November, 1996
Table of Contents
December, 1996
Table of Contents
1997 January, 1997
Table of Contents
February, 1997
Table of Contents
March, 1997
Table of Contents
April, 1997
Table of Contents
May, 1997
Table of Contents
June, 1997
Table of Contents
July, 1997
Table of Contents
August, 1997
Table of Contents
September, 1997
Table of Contents
October, 1997
Table of Contents
November, 1997
Table of Contents
December, 1997
Table of Contents
1998 January, 1998
Table of Contents
February, 1998
Table of Contents
March, 1998
Table of Contents
April, 1998
Table of Contents
May, 1998
Table of Contents
June, 1998
Table of Contents
July, 1998
Table of Contents
August, 1998
Table of Contents
September, 1998
Table of Contents
October, 1998
Table of Contents
November, 1998
Table of Contents
December, 1998
Table of Contents
1999 January, 1999
Table of Contents
February, 1999
Table of Contents
March, 1999
Table of Contents
April, 1999
Table of Contents
May, 1999
Table of Contents
June, 1999
Table of Contents
July, 1999
Table of Contents
August, 1999
Table of Contents
September, 1999
Table of Contents
October, 1999
Table of Contents
November, 1999
Table of Contents
December, 1999
Table of Contents
2000 January, 2000
Table of Contents
February, 2000
Table of Contents
March, 2000
Table of Contents
April, 2000
Table of Contents
May, 2000
Table of Contents
June, 2000
Table of Contents
July, 2000
Table of Contents
August, 2000
Table of Contents
September, 2000
Table of Contents
October, 2000
Table of Contents
November, 2000
Table of Contents
December, 2000
Table of Contents
2001 January, 2001
Table of Contents
February, 2001
Table of Contents
March, 2001
Table of Contents
April, 2001
Table of Contents
May, 2001
Table of Contents
June, 2001
Table of Contents
July, 2001
Table of Contents
August, 2001
Table of Contents
September, 2001
Table of Contents
October, 2001
Table of Contents
November, 2001
Table of Contents
December, 2001
Table of Contents
2002 January, 2002
Table of Contents
February, 2002
Table of Contents
March, 2002
Table of Contents
April, 2002
Table of Contents
May, 2002
Table of Contents
June, 2002
Table of Contents
July, 2002
Table of Contents
August, 2002
Table of Contents
September, 2002
Table of Contents
October, 2002
Table of Contents
November, 2002
Table of Contents
December, 2002
Table of Contents
2003 January, 2003
Table of Contents
February, 2003
Table of Contents
March, 2003
Table of Contents
April, 2003
Table of Contents
May, 2003
Table of Contents
June, 2003
Table of Contents
July, 2003
Table of Contents
August, 2003
Table of Contents
September, 2003
Table of Contents
October, 2003
Table of Contents
November, 2003
Table of Contents
December, 2003
Table of Contents
2004 January, 2004
Table of Contents
February, 2004
Table of Contents
March, 2004
Table of Contents
April, 2004
Table of Contents
May, 2004
Table of Contents
June, 2004
Table of Contents
July, 2004
Table of Contents
August, 2004
Table of Contents
September, 2004
Table of Contents
October, 2004
Table of Contents
November, 2004
Table of Contents
December, 2004
Table of Contents
2005 January, 2005
Table of Contents
February, 2005
Table of Contents
March, 2005
Table of Contents
April, 2005
Table of Contents
May, 2005
Table of Contents
June, 2005
Table of Contents
July, 2005
Table of Contents
August, 2005
Table of Contents
September, 2005
Table of Contents
October, 2005
Table of Contents
November, 2005
Table of Contents
December, 2005
Table of Contents
2006 January, 2006
Table of Contents
February, 2006
Table of Contents
March, 2006
Table of Contents
April, 2006
Table of Contents
May, 2006
Table of Contents
June, 2006
Table of Contents
July, 2006
Table of Contents
August, 2006
Table of Contents
September, 2006
Table of Contents
October, 2006
Table of Contents
November, 2006
Table of Contents
December, 2006
Table of Contents
2007 January, 2007
Table of Contents
February, 2007
Table of Contents
March, 2007
Table of Contents
April, 2007
Table of Contents
May, 2007
Table of Contents
June, 2007
Table of Contents
July, 2007
Table of Contents
August, 2007
Table of Contents
September, 2007
Table of Contents
October, 2007
Table of Contents
November, 2007
Table of Contents
December, 2007
Table of Contents
2008 January, 2008
Table of Contents
February, 2008
Table of Contents
March, 2008
Table of Contents
April, 2008
Table of Contents
May, 2008
Table of Contents
June, 2008
Table of Contents
July, 2008
Table of Contents
August, 2008
Table of Contents
September, 2008
Table of Contents
October, 2008
Table of Contents
November, 2008
Table of Contents
December, 2008
Table of Contents
2009 January, 2009
Table of Contents
February, 2009
Table of Contents
March, 2009
Table of Contents
April, 2009
Table of Contents
May, 2009
Table of Contents
June, 2009
Table of Contents
July, 2009
Table of Contents
August, 2009
Table of Contents
September, 2009
Table of Contents
October, 2009
Table of Contents
November, 2009
Table of Contents
December, 2009
Table of Contents
2010 January, 2010
Table of Contents
February, 2010
Table of Contents
March, 2010
Table of Contents
April, 2010
Table of Contents
May, 2010
Table of Contents
June, 2010
Table of Contents
July, 2010
Table of Contents
August, 2010
Table of Contents
September, 2010
Table of Contents
October, 2010
Table of Contents
November, 2010
Table of Contents
December, 2010
Table of Contents
2011 January, 2011
Table of Contents
February, 2011
Table of Contents
March, 2011
Table of Contents
April, 2011
Table of Contents
May, 2011
Table of Contents
June, 2011
Table of Contents
July, 2011
Table of Contents
August, 2011
Table of Contents
September, 2011
Table of Contents
October, 2011
Table of Contents
November, 2011
Table of Contents
December, 2011
Table of Contents
2012 January, 2012
Table of Contents
February, 2012
Table of Contents
March, 2012
Table of Contents
April, 2012
Table of Contents
May, 2012
Table of Contents
June, 2012
Table of Contents
July, 2012
Table of Contents
August, 2012
Table of Contents
September, 2012
Table of Contents
October, 2012
Table of Contents
November, 2012
Table of Contents
December, 2012
Table of Contents
2013 January, 2013
Table of Contents
February, 2013
Table of Contents
March, 2013
Table of Contents
April, 2013
Table of Contents
May, 2013
Table of Contents
June, 2013
Table of Contents
July, 2013
Table of Contents
August, 2013
Table of Contents
September, 2013
Table of Contents
October, 2013
Table of Contents
November, 2013
Table of Contents
December, 2013
Table of Contents
2014 January, 2014
Table of Contents
February, 2014
Table of Contents
March, 2014
Table of Contents
April, 2014
Table of Contents
May, 2014
Table of Contents
June, 2014
Table of Contents
Zer0pad's Intro To ASM VX 01 - Introducción a la programación de virus en ASM
02 - Introducción a la programación de virus en ASM
03 - Introducción a la programación de virus en ASM
04 - Introducción a la programación de virus en ASM
05 - Introducción a la programación de virus en ASM
06 - Introducción a la programación de virus en ASM
07 - Introducción a la programación de virus en ASM
08 - Introducción a la programación de virus en ASM
09 - Introducción a la programación de virus en ASM
10 - Introducción a la programación de virus en ASM
11 - Introducción a la programación de virus en ASM
12 - Introducción a la programación de virus en ASM
13 - Introducción a la programación de virus en ASM
14 - Introducción a la programación de virus en ASM
15 - Introducción a la programación de virus en ASM
16 - Introducción a la programación de virus en ASM
Symantec 32-Bit Virus Threats on 64-Bit Windows
IME as a Possible Keylogger
Have I Got News for you: Analysis of Flamer C&C Server
Analysis of malware targeting the Boleto payment system
An Analysis of the Slapper Worm Exploit
Analysis of the Windows Vista Security Model
Android.Opfake In-Depth
The Apple threat landscape
Assessment of Windows Vista Kernel-Mode Security
Assets, Threats and Vulnerabilities: Discovery and Analysis
Attacks on point-of-sales systems
Attacks on Virtual Machine Emulators
ATTACKS ON WIN32 – PART II
The Black Vine cyberespionage group
Symantec Brightmail™ Anti Phishing
The continued rise of DDoS attacks
Crisis: The Advanced Malware
Cyberterrorism?
Cyberterrorism and the Home User
The Digital Immune System
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Drive-By Pharming
The Economics of Information Warfare - Poking Layered Security with a Stick
The Elderwood Project
The evolution of the fileless click-fraud malware Poweliks
Evolving ShellCode
Financial threats 2015
Hidden Lynx – Professional Hackers for Hire
How safe is your quantified self?
Hunting For Metamorphic
IM_a nuisance – W32.Imav.A
THE INCREASED USE OF POWERSHELL IN ATTACKS
Insecurity in the Internet of Things
ISTR Cryptojacking: A Modern Cash Cow
Learn More About Viruses and Worms
The Luckycat Hackers
Malicious Threats to Personal Digital Assistants
Malicious Threats and Vulnerabilities in Instant Messaging
Malicious Yahooligans
Malicious Threats of Peer-to-Peer Networking
Managing Security Incidents in the Enterprise
Me code write good: The l33t skillz of the virus writer.
MEMORY SCANNING UNDER WINDOWS NT
Microsoft Office 2000 and Security Against Macro Viruses
Mistakes in the IaaS cloud could put your data at risk
Mobile Adware and Malware Analysis
Motivations of Recent Android Malware
Responding to the Nimda worm: Recommendations for addressing blended threats
NTFS Streams
Palm Breach
The Panda Outlaw: W32.Fujacks
Peerbot: Catch me if you can
Phishing Attacks In and Around April through September 2006
“Phishing In The Middle Of The Stream” - Today’s Threats To Online Banking
Potential Threats to WAP Enabled Devices
Ransomware and Businesses 2016
Ransomware: A Growing Menace
Regin: Top-tier espionage tool enables stealthy surveillance
Regional Threats
Rootkits
Sality: Story of a Peerto-Peer Viral Network
Scams and Spam to Avoid on Facebook
Script-Based Mobile Threats
Stealing Virtual Assets from a Digital World
Stories From The DRM World: The Settec Case
Striking Similarites: Win32/Simile and Metamorphic Virus Code
Stuxnet 0.5: The Missing Link
Targeted Attacks Against the Energy Sector
Techniques of Adware and Spyware
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications
A Testing Methodology for Rootkit Removal Effectiveness
The evolution of ransomware
The Nitro Attacks: Stealing Secrets from the Chemical Industry
Threats to Online Banking
Threats to virtual environments
Trojan.Bamital
Trojan.Neloweg: Bank Robbing Bot in the Browser
Trojan.Taidoor: Targeting Think Tanks
Uncovering a persistent diet spam operation on Twitter
Understanding and Managing Polymorphic Viruses
Understanding Symantec’s Anti-virus Strategy for Internet Gateways
Understanding Heuristics: Symantec’s Bloodhound Technology
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior under Windows NT
Virus and Vulnerability Classification Schemes: Standards and Integration
W32.Changeup: How the Worm Was Created
W32.Duqu: The precursor to the next Stuxnet
W32.Qakbot in Detail
W32.Xpaj.B: Making Easy Money from Complex Code
The Waterbug attack group
Web Based Attacks
What next? Trojan.Linkoptimizer
What’s in a Name?
When Malware Meets Rootkits
Windows Rootkit Overview
Windows 8 Security
Wireless LAN Security
The World of Financial Trojans
ZeroAccess Indepth
Windows Vista Network Attack Surface Analysis
W32.Ramnit analysis
Trojan.ZeroAccess: Infection Analysis
Inside the Windows Meta File Format
APT1 About APT1: PLA Unit 61398 | Comment Crew
APT1: Exposing One of Chinas Cyber Espionage Units | Mandiant
Computer Espionage, Titan Rain and China | James A. Lewis
About GhostNet
Tracking GhostNet: Investigating a Cyber Espionage Network | CitizenLab
Study Of GhostNet | Sreepriya Chalakkal
About Operation Aurora
Operation Aurora: Detect, Diagnose, Respond | HB Gary
Combating Operation Aurora | McAfee Labs
Protecting Your Critical Assets: Lessons Learned from “Operation Aurora” | McAfee Labs
ATM APIs ATM SDK MIB Installer
SDK XFS 207a
SDK XFS 303
J/eXtensions for Financial Services (J/XFS) for the Java Platform 1: Base Architecture
2: Pin Keypad Device Class Interface
3: Magnetic Stripe & Chip Card Device Class Interface
4: Text Input/Output Device Interface
5: Cash Dispenser, Recycler and ATM Device Class Interface
6: Printer Device Class Interface
7: Alarm Device Interface
8: Sensors and Indicators Unit Device Class Interface
9: Depository Device Class Interface
10: Check Reader/Scanner Device Class Interface
Extensions for Financial Services (XFS) interface specification C++ 1: Application Programming Interface (API) Service Provider Interface (SPI)
2: Service Class Definition
3: Printer and Scanning Device Class Interface
4: Identification Card Device Class Interfac
5: Cash Dispenser Device Class Interface
6: PIN Keypad Device Class Interface
7: Check Reader/Scanner Device Class Interface
8: Depository Device Class Interface
9: Text Terminal Unit Device Class Interface
10: Sensors and Indicators Unit Device Class Interface
11: Vendor Dependent Mode Device Class Interface
12: Camera Device Class Interface
13: Alarm Device Class Interface
14: Card Embossing Unit Device Class Interface
15: Cash-In Module Device Class Interface
16: Card Dispenser Device Class Interface
17: Barcode Reader Device Class Interface
18: Item Processing Module Device Class Interface
`. `odms- `odmmmmmy- `ymmmmmmmmh. hmmmmmmd` ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd -yo-..............hmmmmmmd...............+y: -ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh. `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `omdysyyyyssssyyyyydmmmmmmmyyyyyyyyyyyyssydmh/ .` hmmmmmmm - hmmmmmmm `- hmmmmmmm -` `+dmdssssssssssssssssssssssssdmmmmmmmsssssssssssssssssssssssshmdo` `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmdo` `odmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .o:........................hmmmmmmm-.......................:o- hmmmmmmm` hmmmmmmm` ````` hmmmmmmm` ````` -/oyhmmmmmmmdhs+:` hmmmmmmm` `:+sydmmmmmmmdhs+:` `:sdmmmmmmmmmmmmmmmmmmho- hmmmmmmm` .+ymmmmmmmmmmmmmmmmmmmy/` `+dmmmmmmmmmmmmmmmmmmmmmmmmh+.hmmmmmmm./hmmmmmmmmmmmmmmmmmmmmmmmmdo` :dmmmmmmmmmmmddhhdmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmddhddmmmmmmmmmmmd/ /mmmmmmmmmh+-` `.:ohmmmmmmmmmmmmmmmmmmmmmmmmho/.` `-+ymmmmmmmmmo :mmmmmmmmh: .+dmmmmmmmmmmmmmmmmmmd+. -ymmmmmmmm/ hmmmmmmmy` :ymmmmmmmmmmmmmmh/ ommmmmmmd` .mmmmmmmd` -smmmmmmmmmmh: hmmmmmmm: -mmmmmmmy -dmmmmmmmmm/ ommmmmmm/ `mmmmmmmd `smmmmmmmmmmmmy. ymmmmmmm- smmmmmmms `+dmmmmmmmmmmmmmmmo` +mmmmmmmh `dmmmmmmmh: -odmmmmmmmmmdmmmmmmmmms- -ymmmmmmmd. .dmmmmmmmmds/-.` `-/sdmmmmmmmmmmy.`smmmmmmmmmmds/-.` `.-/ohmmmmmmmmd- `ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmd/ -hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmy. :ymmmmmmmmmmmmmmmmmmmmmmmmmd+` /dmmmmmmmmmmmmmmmmmmmmmmmmmh: -ohmmmmmmmmmmmmmmmmmmmds: :sdmmmmmmmmmmmmmmmmmmmds- ./oydmmmmmmmmmdhs+- -/shdmmmmmmmmmdyo/. `..----.` `..---..`