Downloads

Name Date Author Size DL's Rating Get
Unleashing Mayhem on Binary Code 18 Jun 2012 : 13:40 Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley 794.60kB 348
0/5 : Not rated
Trends in Circumventing Web-Malware Detection 04 Dec 2011 : 11:29 [ Various Authors ] 266.98kB 250
0/5 : Not rated
The Rise of PDF Malware 19 Sep 2010 : 05:38 Karthik Selvaraj + Nino Fred Gutierrez 1.80MB 571
0/5 : Not rated
The Evolution of TDL: Conquering x64 26 May 2011 : 13:45 Eugene Rodionov, Aleksandr Matrosov 1.41MB 370
0/5 : Not rated
The Conficker Mystery 30 Jul 2009 : 10:40 Mikko Hypponen 84.70kB 839
0/5 : Not rated
The Case of TTrojan DownLoader "TDL3TDL3" 28 Jul 2010 : 13:16 Ace PortuguezAce 1.49MB 547
0/5 : Not rated
System-Centric CUDA Threat Modeling with CUBAR 18 Dec 2010 : 05:28 Nick Black + Jason Rodzik 2.68MB 359
0/5 : Not rated
Swimming Into Hostile Code 04 Oct 2009 : 13:51 Giuseppe 'Evilcry' Bonfa 1.83MB 903
0/5 : Not rated
Supervised Learning for Provenance-Similarity of Binaries 04 Dec 2011 : 11:31 Sagar Chaki, Cory Cohen, Arie Gurfinkel 621.07kB 265
0/5 : Not rated
SubVirt: Implementing Malware with Virtual Machines 19 Feb 2011 : 14:09 Samuel T. King + Peter M. Chen + Yi-Min Wang + Chad Verbowski + Helen J. Wang + Jacob R. Lorch 185.93kB 443
0/5 : Not rated
Securing The Kernel via Static Binary Rewriting and Program Shepherding 06 Jun 2011 : 08:36 Piotr Bania 357.15kB 286
0/5 : Not rated
Safety Checking of Machine Code 08 May 2010 : 02:56 Zhichen Xu + Barton P.Miller + Thomas Reps 86.47kB 402
0/5 : Not rated
Return-oriented Programming without Returns 19 Feb 2011 : 14:18 Stephen Checkoway + Hovav Shacham 329.06kB 394
0/5 : Not rated
Remote Buffer Overflow Exploits 08 May 2010 : 02:57 Amit Malik 662.60kB 698
0/5 : Not rated
Proactive Detection of Computer Worms Using Model Checking 19 Feb 2011 : 14:26 Johannes Kinder + Stefan Katzenbeisser + Christian Schallhart + Helmut Veith 412.85kB 318
0/5 : Not rated
Portable Document Format Malware 27 Mar 2011 : 09:25 Kazumasa Itabashi 838.80kB 558
0/5 : Not rated
On the Semantics of Self-Unpacking Malware Code 18 Dec 2010 : 04:20 Saumya K. Debray + Kevin P. Coogan + Gregg M. Townsend 149.45kB 362
0/5 : Not rated
On the Analysis of the Zeus Botnet Crimeware Toolkit 11 Sep 2011 : 12:36 [ Various Authors ] 213.72kB 579
0/5 : Not rated
Memory Behavior-Based Automatic Malware Unpacking in Stealth Debugging Environment 27 Mar 2011 : 09:43 Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh 261.55kB 399
0/5 : Not rated
Mass Malware Analysis - A Do It Yourself Kit 08 Mar 2010 : 13:45 Christian Wojner 836.66kB 1622
0/5 : Not rated
Malicious Code Detection Technologies 27 Mar 2011 : 09:52 Alisa Shevchenko 254.87kB 645
0/5 : Not rated
Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software 27 Mar 2011 : 09:49 Murray Brand, Craig Valli and Andrew Woodward 91.47kB 326
0/5 : Not rated
Kernel-based monitoring on Windows (32/64 bit) 06 Apr 2014 : 05:28 Florian Rienhardt 862.29kB 700
0/5 : Not rated
Kernel Malware - The Attack from Within 28 Jul 2010 : 13:41 Kimmo Kasslin 615.62kB 1075
0/5 : Not rated
Introduction to Malware Techniques and Logics - Part 1 28 Aug 2009 : 15:04 Gunther 2.63MB 1873
0/5 : Not rated
Introduction to File Infection Techniques 13 Apr 2010 : 14:22 ir3t 393.87kB 1828
0/5 : Not rated
Internal of Windows Memory Management for Malware Analysis 06 Jun 2011 : 08:45 Carsten Willems 382.62kB 565
0/5 : Not rated
Information-based Dependency Matching For Behavioral Malware Analysis 25 Dec 2012 : 13:13 Lars Arne Sand 8.72MB 559
0/5 : Not rated
Inference and Analysis of Formal Models of Botnet 28 Jul 2010 : 13:46 [ Various Authors ] 407.77kB 671
0/5 : Not rated
Hunting Obfuscated Malwares 09 May 2010 : 02:16 Mila Dalla Preda 14.44kB 513
0/5 : Not rated
Return to Category List 19268 download(s) from 30 files