Malware research

Results: 246



#Item
31

SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2006-03-03 22:37:06
    32Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

    Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2013-05-17 10:01:48
    33Computing / Smartphones / Embedded Linux / Computer security / Malware / Sandbox / Dalvik / Mobile operating system / Antivirus software / Software / System software / Android

    Enter Sandbox: Android Sandbox Comparison Sebastian Neuner∗ , Victor van der Veen† , Martina Lindorfer‡ , Markus Huber∗ , Georg Merzdovnik∗ , Martin Mulazzani∗ and Edgar Weippl∗ ∗ SBA Research

    Add to Reading List

    Source URL: www.mostconf.org

    Language: English - Date: 2014-07-18 15:43:17
    34Social engineering / Botnets / Computing / Rootkits / Computer network security / Phishing / Zeus / Rock Phish / Email spam / Spamming / Malware / Cybercrime

    1 Ethical Dilemmas in Take-down Research Tyler Moore1 and Richard Clayton2 1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-04-06 07:55:39
    35Peer-to-peer / Internet / Email / Spamming / Computer network security / Computing / Malware

    THREAT DATASHEET Mobile Threats | NotCompatible.C | Research by Tim Strazzere NOTCOMPATIBLE.C A Sophisticated Mobile Threat that

    Add to Reading List

    Source URL: www.lookout.com

    Language: English - Date: 2015-06-17 19:35:01
    36Virtual machines / Programming language implementation / Rootkit / Malware / Windows Virtual PC / Hypervisor / VirtualBox / Ring / Operating system / System software / Software / VMware

    SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2006-03-03 22:37:06
    37Computer network security / Malware / Software quality / Application software / Vulnerability / Threat / Rootkit / Microsoft Security Essentials / Software / Cyberwarfare / Computer security / Computing

    Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2014-10-09 10:35:01
    38Internet / URI schemes / Malware / JavaScript / Webalizer / Client honeypot / World Wide Web / HTTP referer / Spyware / Computing / Espionage / Uniform resource locator

    Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,

    Add to Reading List

    Source URL: nsl.cs.waseda.ac.jp

    Language: English - Date: 2011-12-23 02:37:56
    39Computing / Mac OS X Leopard / Mac OS X Lion / Mac OS X Snow Leopard / Windows XP / Malware / Operating system / Macintosh / Google Chrome / Software / Computer architecture / Mac OS X

    UWM Research Data Stewardship Whether a research project generates gigabytes or petabytes of data, proper stewardship is ultimately the responsibility of the project sponsor. UWM Information Security offers the following

    Add to Reading List

    Source URL: pantherfile.uwm.edu

    Language: English - Date: 2015-02-05 15:27:42
    40Computer crimes / Bank fraud / Zeus / Malware / Computer security / Kaspersky Lab / Software / Spamming / Antivirus software / System software / Botnets

    The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

    Add to Reading List

    Source URL: press.kaspersky.com

    Language: English - Date: 2014-06-20 07:32:13
    UPDATE