Malware research

Results: 246



#Item
41Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
42System	
  Security	
  Research	
  @	
   University	
  of	
  Birmingham,	
  UK	
   Marco	
  Cova	
   	
    Security	
  group	
  

System  Security  Research  @   University  of  Birmingham,  UK   Marco  Cova     Security  group  

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:32:20
43WOMBAT:	
  a	
  Worldwide	
  Observatory	
  	
   of	
  Malicious	
  Behaviors	
  and	
  A;ack	
  Threats	
   Corrado	
  Leita	
   Symantec	
  Research	
  Labs	
   WOMBAT	
  

WOMBAT:  a  Worldwide  Observatory     of  Malicious  Behaviors  and  A;ack  Threats   Corrado  Leita   Symantec  Research  Labs   WOMBAT  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:51
44Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
45European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, we

European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, we

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-22 10:52:19
46SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-01-30 16:47:51
47OPINION  Why Offensive Security Needs Engineering Textbooks  Or, How to Avoid a Replay of “Crypto Wars” in Security Research

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
48Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
49Kizzle: A Signature Compiler for Exploit Kits MSR-TRBen Stock Benjamin Livshits and Benjamin Zorn

Kizzle: A Signature Compiler for Exploit Kits MSR-TRBen Stock Benjamin Livshits and Benjamin Zorn

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2015-02-13 19:37:17
50Embedded Malware Ruhr-University Bochum Systems Security Research at Thorsten Holz

Embedded Malware Ruhr-University Bochum Systems Security Research at Thorsten Holz

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:36:05