Covering the global threat landscape PROSECTING THE CITADEL BOTNET – REVEALING THE DOMINANCE OF THE ZEUS DESCENDENT
暂无分享,去创建一个
[1] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[2] Ravishankar Borgaonkar,et al. An Analysis of the Asprox Botnet , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[3] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[4] Guanhua Yan,et al. RatBot: Anti-enumeration Peer-to-Peer Botnets , 2011, ISC.
[5] Jan Vykopal,et al. Embedded Malware - An Analysis of the Chuck Norris Botnet , 2010, 2010 European Conference on Computer Network Defense.
[6] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[7] David Lee,et al. Traceback Attacks in Cloud -- Pebbletrace Botnet , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[8] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[9] Richard J. Enbody,et al. Dissecting SpyEye - Understanding the design of third generation botnets , 2013, Comput. Networks.
[10] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.
[11] Richard J. Enbody,et al. Crimeware-as-a-service - A survey of commoditized crimeware in the underground market , 2013, Int. J. Crit. Infrastructure Prot..
[12] Mourad Debbabi,et al. Insights from the analysis of the Mariposa botnet , 2010, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS).