Downloads

Name Date Author Size DL's Rating Get
Unleashing Mayhem on Binary Code 18 Jun 2012 : 13:40 Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley 794.60kB 338
0/5 : Not rated
Trends in Circumventing Web-Malware Detection 04 Dec 2011 : 11:29 [ Various Authors ] 266.98kB 241
0/5 : Not rated
The Rise of PDF Malware 19 Sep 2010 : 05:38 Karthik Selvaraj + Nino Fred Gutierrez 1.80MB 560
0/5 : Not rated
The Evolution of TDL: Conquering x64 26 May 2011 : 13:45 Eugene Rodionov, Aleksandr Matrosov 1.41MB 357
0/5 : Not rated
The Conficker Mystery 30 Jul 2009 : 10:40 Mikko Hypponen 84.70kB 829
0/5 : Not rated
The Case of TTrojan DownLoader "TDL3TDL3" 28 Jul 2010 : 13:16 Ace PortuguezAce 1.49MB 535
0/5 : Not rated
System-Centric CUDA Threat Modeling with CUBAR 18 Dec 2010 : 05:28 Nick Black + Jason Rodzik 2.68MB 349
0/5 : Not rated
Swimming Into Hostile Code 04 Oct 2009 : 13:51 Giuseppe 'Evilcry' Bonfa 1.83MB 894
0/5 : Not rated
Supervised Learning for Provenance-Similarity of Binaries 04 Dec 2011 : 11:31 Sagar Chaki, Cory Cohen, Arie Gurfinkel 621.07kB 254
0/5 : Not rated
SubVirt: Implementing Malware with Virtual Machines 19 Feb 2011 : 14:09 Samuel T. King + Peter M. Chen + Yi-Min Wang + Chad Verbowski + Helen J. Wang + Jacob R. Lorch 185.93kB 433
0/5 : Not rated
Securing The Kernel via Static Binary Rewriting and Program Shepherding 06 Jun 2011 : 08:36 Piotr Bania 357.15kB 276
0/5 : Not rated
Safety Checking of Machine Code 08 May 2010 : 02:56 Zhichen Xu + Barton P.Miller + Thomas Reps 86.47kB 391
0/5 : Not rated
Return-oriented Programming without Returns 19 Feb 2011 : 14:18 Stephen Checkoway + Hovav Shacham 329.06kB 384
0/5 : Not rated
Remote Buffer Overflow Exploits 08 May 2010 : 02:57 Amit Malik 662.60kB 688
0/5 : Not rated
Proactive Detection of Computer Worms Using Model Checking 19 Feb 2011 : 14:26 Johannes Kinder + Stefan Katzenbeisser + Christian Schallhart + Helmut Veith 412.85kB 312
0/5 : Not rated
Portable Document Format Malware 27 Mar 2011 : 09:25 Kazumasa Itabashi 838.80kB 549
0/5 : Not rated
On the Semantics of Self-Unpacking Malware Code 18 Dec 2010 : 04:20 Saumya K. Debray + Kevin P. Coogan + Gregg M. Townsend 149.45kB 351
0/5 : Not rated
On the Analysis of the Zeus Botnet Crimeware Toolkit 11 Sep 2011 : 12:36 [ Various Authors ] 213.72kB 571
0/5 : Not rated
Memory Behavior-Based Automatic Malware Unpacking in Stealth Debugging Environment 27 Mar 2011 : 09:43 Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh 261.55kB 386
0/5 : Not rated
Mass Malware Analysis - A Do It Yourself Kit 08 Mar 2010 : 13:45 Christian Wojner 836.66kB 1594
0/5 : Not rated
Malicious Code Detection Technologies 27 Mar 2011 : 09:52 Alisa Shevchenko 254.87kB 630
0/5 : Not rated
Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software 27 Mar 2011 : 09:49 Murray Brand, Craig Valli and Andrew Woodward 91.47kB 318
0/5 : Not rated
Kernel-based monitoring on Windows (32/64 bit) 06 Apr 2014 : 05:28 Florian Rienhardt 862.29kB 690
0/5 : Not rated
Kernel Malware - The Attack from Within 28 Jul 2010 : 13:41 Kimmo Kasslin 615.62kB 1057
0/5 : Not rated
Introduction to Malware Techniques and Logics - Part 1 28 Aug 2009 : 15:04 Gunther 2.63MB 1856
0/5 : Not rated
Introduction to File Infection Techniques 13 Apr 2010 : 14:22 ir3t 393.87kB 1812
0/5 : Not rated
Internal of Windows Memory Management for Malware Analysis 06 Jun 2011 : 08:45 Carsten Willems 382.62kB 552
0/5 : Not rated
Information-based Dependency Matching For Behavioral Malware Analysis 25 Dec 2012 : 13:13 Lars Arne Sand 8.72MB 547
0/5 : Not rated
Inference and Analysis of Formal Models of Botnet 28 Jul 2010 : 13:46 [ Various Authors ] 407.77kB 653
0/5 : Not rated
Hunting Obfuscated Malwares 09 May 2010 : 02:16 Mila Dalla Preda 14.44kB 502
0/5 : Not rated
Return to Category List 18909 download(s) from 30 files