important paper for you guys.

View previous topic View next topic Go down

important paper for you guys.

Post by sachinrana135 on Thu Jan 16, 2014 9:36 am

consist of
Code:
FILE    2007_28C3_Effective_DoS_on_web_application_platforms.pdf
FILE    3755.Microsoft Study into b70.pdf
FILE    A Case Study on the Asprox Botnet SQL Infection Dynamics.pdf
FILE    A Comparitive Analysis of Rootkit Detection Techniques.pdf
FILE    A Multifaceted Approach to Understanding the Botnet Phenomenon.pdf
FILE    a_museum_of_api_obfuscation_on_win32.pdf
FILE    Abusing Forced Inline in C _ Development & Security.htm
FILE    Abusing Forced Inline Part 2  Breakpoints _ Development & Security.htm
FILE    Advanced Persistent Threats.pdf
FILE    advancedApproachToDllInjectionAndHooking.pdf
FILE    An Advanced Hybrid Peer-to-Peer Botnet.pdf
FILE    An Analysis of Conficker C.html
FILE    An Analysis of Conficker.htm
FILE    Analysis_W32.Virut_.ce_.pdf
FILE    Analysis-of-TR.Spy_.SpyEye.pdf
FILE    an-overview-of-rustock.html
FILE    Anti-Debugging A Developer's View.pdf
FILE    anti-emulation through time-lock puzzles.pdf
FILE    anti-vm anti-emulation.pdf
FILE    AusCERT_2011_Andreas_Baumhof_V2.pdf
FILE    auscert2009-confickersinkhole.pdf
FILE    BH_US_08_Stewart_Protocols_of_the_Storm.pdf
FILE    BlackEnergy+DDoS+Bot+Analysis.pdf
FILE    blackhat2012-paper.pdf
FILE    blackhat2012-presentation.pdf
FILE    blackhole_paper_mar2012.pdf
FILE    Camouflage in Malware.pdf
FILE    Carberp - A Modular Information Stealing Trojan.pdf
FILE    Carberp and Ring 0 (+ blackhole).pdf
FILE    Carberp_Analysis (Trusteer).pdf
FILE    clash-titans-zeus-spyeye_33393.pdf
FILE    Combating Threats - W32 Sality.pdf
FILE    common substring analysis.pdf
FILE    Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf
FILE    conficker-analysis.pdf
FILE    contextcarberp.htm
FILE    ContextCarberpAnalysis.htm
FILE    COSIC_Srizbi.pdf
FILE    costofspam.pdf
FILE    cutwail-LEET11.pdf
FILE    decrypting-carberp-c-communication.html
FILE    defeating rop.pdf
FILE    entropy_analysis_encrypted_packed_malware.pdf
FILE    ESET_win32georbot_analysis_final.pdf
FILE    evasion and detection of metamorphic viruses.pdf
FILE    EventPairsHandle.pdf
FILE    FASTFLUX.HTM
FILE    flame.pdf
FILE    hc128_p3.pdf
FILE    Heaven'sGate.html
FILE    Hodprot-Report.pdf
FILE    how-to-defeat-koobface.html
FILE    HS-P005_ReflectiveDllInjection.pdf
FILE    hydraq_final_231538.pdf
FILE    iwm-koobface.pdf
FILE    kasperskyOnRustock.htm
FILE    KelihosAnalysis.htm
FILE    killing-the-beast.html
FILE    king-of-spam-festi-botnet-analysis.pdf
FILE    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co.htm
FILE    Koobface Anti-Emulation Time Lock Trick _ Security News.htm
FILE    KYE-Conficker.pdf
FILE    leouncia-yet-another-backdoor.html
FILE    leouncia-yet-another-backdoor-part-2.html
FILE    Lessons from Conficker.pdf
FILE    little doggy.pdf
FILE    malcode-context-api-abuse_33649.pdf
FILE    malwareforensics.pdf
FILE    Mariposa Botnet Analysis.pdf
FILE    More human than human – Flame’s code injection techniques.htm
FILE    Obfuscation of Executable Code to Improve Resistance to Static Disassembly.pdf
FILE    On_the_Analysis_of_the_Zeus_Botnet_Crimeware.pdf
FILE    opaque predicate detection by abstraction.pdf
FILE    opaque_predicates1.pdf
FILE    opaque_predicates2.pdf
FILE    Peer-to-Peer Communication Across Network Address Translators.htm
FILE    PEST-CONTROL.pdf
FILE    Process-Hollowing.pdf
FILE    provenance.pdf
FILE    Puppet process.htm
FILE    Reflections on Conficker.pdf
FILE    remote-library-injection.pdf
FILE    Robust Efficient Distributed RSA-Key Generation.pdf
FILE    ROOTKITS.PDF
FILE    Roots_of_Evil (general rootkit).pdf
FILE    Roundtable on Malware Defense.pdf
FILE    rp-predicting-stealth-attacks.pdf
FILE    RustockB.pdf
FILE    RustockC (Dr. Web).pdf
FILE    Same Botnet, Same Guys, New Code -- Kelihos.pdf
FILE    Shin_TIFS12_Conficker.pdf
FILE    Silon_Analysis_v5_PR-MBfinal.pdf
FILE    skywiper.pdf
FILE    Sophos_ZeroAccess_Botnet.pdf
FILE    SpyEye_Soldier_BotnetCaseStudy.pdf
FILE    Storm_Worm_Botnet_Analysis_-_June_2008.pdf
FILE    study_of_pushdo.pdf
FILE    Stuxnet_Under_the_Microscope.pdf
FILE    SybilAttack.pdf
FILE    TDL3-Analysis.pdf
FILE    The Art of Bootkit Development.pdf
FILE    The Art of Unpacking.pdf
FILE    The Growing Harm of Not Teaching Malware.pdf
FILE    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks.htm
FILE    The New Face of War (Stuxnet).pdf
FILE    The Ultimate Anti-Debugging Reference.pdf
FILE    the_bredolab_files.pdf
FILE    the_downadup_codex_ed1.pdf
FILE    the_downadup_codex_ed2.pdf
FILE    The_Evolution_of_TDL4x64.pdf
FILE    the-dead-giveaways-of-vm-aware-malware.html
FILE    ThisPassingStorm.pdf
FILE    top50badhostsandnetworks.pdf
FILE    Towards Static Analysis of Virtualization-Obfusctated Binaries.pdf
FILE    trojan_zeroaccess_infection_analysis.pdf
FILE    utilizing entropy to identify undetected malware.pdf
FILE    w32_duqu_the_precursor_to_the_next_stuxnet.pdf
FILE    w32_qakbot_in_detail.pdf
FILE    w32_stuxnet_dossier.pdf
FILE    W32_Waledac.pdf
FILE    w32_xpaj_b (complex PE infector).pdf
FILE    waledac-ec2nd09.pdf
FILE    weaver-conficker.pdf
FILE    wp_the-real-face-of-koobface.pdf
FILE    wp_w32-tinba-tinybanker.pdf
FILE    Yet_Another_Rustock_Analysis.pdf
FILE    Your Botnet is My Botnet--Analysis of a Botnet Takeover.pdf
FILE    zeroaccess_analysis.pdf
FILE    ZeroAccess’s trick – A wolf in sheep’s clothing.htm
FILE    zeroaccess2.pdf
FILE    zeroaccess-code-injection-chronicles.htm
FILE    zeroaccess-misleads-memory-file-link.htm
FILE    zeus_king_of_bots.pdf
FILE    ZeuS_the_missing_manual_v1.pdf
FILE    ZeusSpyEyeBankingTrojanAnalysis.pdf
FOLDER    Abusing Forced Inline in C _ Development & Security_files\
FOLDER    Abusing Forced Inline Part 2  Breakpoints _ Development & Security_files\
FOLDER    An Analysis of Conficker C_files\
FOLDER    An Analysis of Conficker_files\
FOLDER    an-overview-of-rustock_files\
FOLDER    Context_files\
FOLDER    decrypting-carberp-c-communication_files\
FOLDER    fastflux_files\
FOLDER    Heaven'sGate_files\
FOLDER    how-to-defeat-koobface_files\
FOLDER    kasperskyOnRustock_files\
FOLDER    KelihosAnalysis_files\
FOLDER    killing-the-beast_files\
FOLDER    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co_files\
FOLDER    Koobface Anti-Emulation Time Lock Trick _ Security News_files\
FOLDER    leouncia-yet-another-backdoor_files\
FOLDER    leouncia-yet-another-backdoor-part-2_files\
FOLDER    More human than human – Flame’s code injection techniques_files\
FOLDER    Peer-to-Peer Communication Across Network Address Translators_files\
FOLDER    Puppet process_files\
FOLDER    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks_files\
FOLDER    the-dead-giveaways-of-vm-aware-malware_files\
FOLDER    ZeroAccess’s trick – A wolf in sheep’s clothing_files\
FOLDER    zeroaccess-code-injection-chronicles_files\
FOLDER    zeroaccess-misleads-memory-file-link_files\
[code][/code]
copy and paste this link
Code:
www.mediafire.com/download/656jfjttc45zi3k/Publications.rar

Credits to the owners/makers of those papers.

The White Hats Report ~ Reporting what the main stream media refuses to report. Some whitehat papers of the anomalies of the government and other economic leaders.
Malware Intelligence. Security against malicious code, computer intelligence and other threats Basic Papers / Check other pages for some basic stuff about Security Viruses.

SecLists.Org Security Mailing List Archive It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.
avatar
sachinrana135
Senior mentor
Senior mentor

Posts : 35
Points : 117
Reputation : 12
Join date : 2014-01-12

Back to top Go down

View previous topic View next topic Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum