-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathReferences.txt
32 lines (16 loc) · 2.41 KB
/
References.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
[Albertini2010] Albertini, Ange; 05 April 2010; https://corkami.googlecode.com/files/packers.pdf; accessed Oct 2015
[Apvrille2014] Axelle Apvrille, Ruchna Nigam; "Obfuscation in android malware, and how to fight back"; 02 July 2014; https://www.virusbulletin.com/virusbulletin/2014/07/obfuscation-android-malware-and-how-fight-back; accessed March 2017
[Bhat2015] Bhat, Raashid; "A Guide to Malware Binary Reconstruction";14 Sep 2015; http://int0xcc.svbtle.com/a-guide-to-malware-binary-reconstruction
[Chishkala2016] Chishkala, Igor; "Understanding Obfuscated Code & How to Deobfuscate PHP and JavaScript"; 08 Jun 2016; https://www.upwork.com/hiring/development/understanding-obfuscated-code-deobfuscate-php-javascript/; accessed May 2017
[Farley2015] Farley, Ryan J.; 24 April 2015; "Toward Automated Forensic Analysis of Obfuscated Malware"
[Ferrie2008] Ferrie, Peter; 2008; "Anti-Unpacker Tricks"; http://pferrie.host22.com/papers/unpackers.pdf; accessed Oct 2015
[Ferrie2011] Ferrie, Peter; 4 May 2011; "The 'Ultimate' Anti-Debugging Reference"; http://pferrie.host22.com/papers/antidebug.pdf; accessed Aug 2017
[Futoransky2006] Futoransky, Ariel, Emiliano Kargieman, Carlos Sarraute, and Ariel Waissbein. "Foundations and applications for secure triggers." ACM Transactions on Information and System Security (TISSEC) 9.1 (2006): 94-112.
[Griffin2015] Griffin, Brendan; 17 Sep 2015; "Upatre malware adds simple anti-sandboxing mechanism"; http://blog.malcovery.com/upatre-malware-adds-simple-anti-sandboxing-mechanism
[Grunzweig2015] Grunzweig, Josh; "Updated PClock Ransomware Still Comes Up Short"; 29 Sep 2015; http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/
[Guo2008] Fanglu Guo, Peter Ferrie, and Tzi-cker Chiue; http://pferrie.host22.com/papers/packerproblem.pdf
[Hohl1998] Hohl, Fritz. "Time limited blackbox security: Protecting mobile agents from malicious hosts." Mobile agents and security (1998): 92-113.
[Infosec2013] "Anti-Memory Dumping Techniques"; 19 Mar 2013; http://resources.infosecinstitute.com/anti-memory-dumping-techniques/
[Insid3Code2015] "[C/C++] Using RtlAdjustPrivilege to detect debugger"; 22 May 2015
[Roth2014] Roght, Florian; "Inverse Yara Signature Matching (Part 1/2)"; 27 May 2014; https://www.bsk-consulting.de/2014/05/27/inverse-yara-signature-matching/
[Szor2005] Szor, Peter; "The Art of Computer Virus Research and Defense"; 2005; ISBN 0-32-130454-3