When Governments Hack Opponents: A Look at Actors and Technology
暂无分享,去创建一个
Vern Paxson | William R. Marczak | John Scott-Railton | Morgan Marquis-Boire | V. Paxson | Morgan Marquis-Boire | J. Scott-Railton
[1] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[2] Jedidiah R. Crandall,et al. ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.
[3] Ross J. Anderson,et al. The snooping dragon: social-malware surveillance of the Tibetan movement , 2009 .
[4] Rolf Rolles,et al. Unpacking Virtualization Obfuscators , 2009, WOOT.
[5] Micah Sherr,et al. Can they hear me now?: a security analysis of law enforcement wiretaps , 2009, CCS.
[6] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[7] Zhuoqing Morley Mao,et al. Internet Censorship in China: Where Does the Filtering Occur? , 2011, PAM.
[8] Morgan Marquis-Boire,et al. Syrian Activists Targeted with BlackShades Spy Software , 2012 .
[9] Morgan Marquis-Boire,et al. From Bahrain with Love: FinFisher’s Spy Kit Exposed? , 2012 .
[10] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[11] Jeffrey Knockel,et al. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC , 2013, First Monday.
[12] J. Scott-Railton. Revolutionary Risks: Cyber Technology and Threats in the 2011 Libyan Revolution , 2013 .
[13] Rob Sloan,et al. Advanced Persistent Threat , 2014 .