Malicious Code

Detecting Backdoors_files/ 04-Sep-2006 20:30 -
F-Secure Corporation Data Security Summary for 2004_files/ 04-Sep-2006 20:31 -
Malware Evolution 2005 - Kapersky Labs_files/ 04-Sep-2006 20:34 -
Skoudis - Infosec's Worst Nightmares Nov 2002_files/ 04-Sep-2006 20:40 -
Why Hackers Are a Giant Threat to Microsoft's Future_files/ 04-Sep-2006 20:42 -
Worms Wreak Havoc on the Net in '03_files/ 04-Sep-2006 20:43 -
A Framework for Modelling Trojans and Computer Virus Infection (1999).pdf 26-Jun-2005 12:38 228k
A New Approach To Mobile Code.pdf 26-Jun-2005 12:38 422k
Advanced Windows 2000 Rootkit Detection - Execution Path Analysis.pdf 26-Jun-2005 12:38 196k
Advanced Windows Rootkit Detection.pdf 26-Jun-2005 12:38 119k
Attacking Malicious Code - A Report to the IRC.pdf 26-Jun-2005 12:38 61k
Attacking Malicious Code - A report to the Infosec Research Council.doc 18-Jun-2005 20:00 84k
Automated Techniques for Provably Safe Mobile Code.pdf 26-Jun-2005 12:38 266k
Beagle_Lessons.pdf 26-Jun-2005 12:38 296k
Blaster Worm - View From 10000 Feet.pdf 09-Oct-2006 13:15 831k
Cascade, Monoculture, Policy.pdf 26-Jun-2005 14:29 872k
Detecting 0-days Attacks With Learning Intrusion Detection Systems.pdf 26-Jun-2005 12:38 557k
Detecting Backdoors.htm 26-Jun-2005 12:38 79k
Detecting and Containing IRC-Controlled Trojans - When Firewalls, AV, and IDS Are Not Enough.htm 26-Jun-2005 12:38 15k
Evaluating Untrusted Software In a Controlled Environment.pdf 26-Jun-2005 12:38 405k
Execution Monitoring of Security-Critical Programs in Distributed Systems - A Specification Based Approach.pdf
11-Jan-2006 11:25 1.1M
F-Secure Corporation Data Security Summary for 2004.htm 26-Jun-2005 12:38 56k
FTC Spyware Workshop - Monitoring Software on Your PC.pdf 26-Jun-2005 12:37 1.1M
Flexible Policy-Directed Code Safety.pdf 26-Jun-2005 12:38 93k
ICSA Labs 10th Annual Virus Prevalence Survey 2004.pdf 26-Jun-2005 12:38 964k
Intrusion Prevention - Security's Silver Bullet.pdf 26-Jun-2005 12:38 46k
MSRT Progress Made, Trends Observed.pdf 17-Jun-2006 19:05 843k
Malware Evolution 2005 - Kapersky Labs.htm 26-Jun-2005 12:38 57k
Meyers - Subversion The Neglected Aspect of Computer Security.pdf 26-Jun-2005 12:38 3.6M
Microsoft Portable Executable and Common Object File Format Specification.doc 26-Jun-2005 12:38 900k
Mobile Code Security.pdf 26-Jun-2005 12:38 135k
NISCC Briefing 082005 - Targeted Trojan attacks in the UK.pdf 26-Jun-2005 12:34 73k
NSA - The Case for Using Layered Defenses to Stop Worms.pdf 26-Jun-2005 12:38 174k
Network Magazine The Gathering DDoS Storm September 1, 2004.htm 26-Jun-2005 12:38 1k
Policy-Directed Code Safety.pdf 26-Jun-2005 12:38 376k
Polygraph - Automatically Generating Signatures for Polymorphic Worms.pdf 26-Jun-2005 12:37 171k
Polymorphic Macro Viruses.pdf 26-Jun-2005 12:38 93k
Proof Carrying Code.pdf 26-Jun-2005 12:38 316k
SANS ISC Report on Malicious BHOs.pdf 26-Jun-2005 12:38 42k
Safe, Untrusted Agents using Proof-Carrying Code.pdf 26-Jun-2005 12:38 377k
Sanbox II - Internet.pdf 26-Jun-2005 12:38 161k
Sentiri - Advances in Trojan Technology.pdf 26-Jun-2005 12:38 1.1M
Skoudis - Infosec's Worst Nightmares Nov 2002.htm 26-Jun-2005 12:38 40k
Strider GhostBuster - Why It´s A Bad Idea For Stealth Software To Hide Files.doc 26-Jun-2005 12:34 1.5M
The Complete Windows Trojans Paper.pdf 26-Jun-2005 12:38 62k
The Future of Fighting Viruses - A History and Analysis of the Digital Immune System.pdf 26-Jun-2005 12:38 241k
Viral Evolution - Infection vectors.pdf 26-Jun-2005 12:38 128k
Virus Bulletin June 2003 - The Scalable Stealth Trojan.pdf 26-Jun-2005 12:38 300k
Where There's Smoke There's Mirrors - The Truth about Trojan Horses on the Internet.htm 26-Jun-2005 12:38 86k
Why Hackers Are a Giant Threat to Microsoft's Future.htm 26-Jun-2005 12:38 35k
Worms Wreak Havoc on the Net in '03.htm 26-Jun-2005 12:38 102k
Zeltser - Reverse Engineering Malware.pdf 26-Jun-2005 12:38 241k
advanced-trojans.pdf 04-Sep-2006 21:05 1.1M
catching-malware-Detecting, Tracking, and Mitigating Botnets-BH-Japan-06.pdf 14-Oct-2006 12:23 2.8M
malicious_code.doc 19-Jun-2005 08:58 84k

hxxp://craigchamberlain.com/malware/

Or

hxxp://craigchamberlain.dreamhosters.com/malware/

index of parent directory
An analysis of the Slapper worm.pdf">An analysis of the Slapper worm.pdf 09-Oct-2004 22:45 225k
digital village_malware month.pdf">digital village_malware month.pdf 09-Oct-2004 22:45 99k
Inside the Slammer worm.pdf">Inside the Slammer worm.pdf 09-Oct-2004 22:45 415k
Internet intrusions_ global characteristics and prevalence.pdf">Internet intrusions_ global char..
> 09-Oct-2004 22:45 683k
Merry christma_ an early network worm.pdf">Merry christma_ an early network..>
09-Oct-2004 22:45 501k
More bang for the bug_ An account of 2003's attack trends.pdf">More bang for the bug_ An accoun..
> 09-Oct-2004 22:45 192k
Next-generation viruses present new challenges.pdf">Next-generation viruses present ..>
09-Oct-2004 22:45 83k
The Morris worm_ a fifteen-year perspective.pdf">The Morris worm_ a fifteen-year ..>
09-Oct-2004 22:45 491k

http://www.mnlab.cs.depaul.edu/~mtaibah/papers/papers about worms and other intrusions/

Modeling Malware Spreading Dynamics.pdf">Modeling Malware Spr..> 24-Apr-2006 09:25 790k
Modeling the Spread of Active Worms.pdf">Modeling the Spread ..> 24-Apr-2006 09:22 569k
On the Effectiveness of Distributed Worm Monitoring.pdf">On the Effectiveness..>
24-Apr-2006 09:27 313k
On the Performance of Internet Worm Scanning Strategies.pdf">On the Performance o..>
24-Apr-2006 09:12 249k
Spatial-Temporal Modeling of Malware Propagation in Networks.pdf">Spatial-Temporal Mod..>
24-Apr-2006 09:24 493k
Worm Propagation Models.pdf">Worm Propagation Mod..> 24-Apr-2006 09:19 69k

hxxp://www.cse.ohio-state.edu/~lina/reading/modeling/worm/

No comments: