Title&col=t">↑&col=t">↓ | Author&col=a">↑&col=a">↓ | Type&col=pt">↑&col=pt">↓ | Year&col=y">↑&col=y">↓ | Lang | Size&col=s">↑&col=s">↓ | link | Comment | Source | Upload&col=u">↑&col=u">↓ | Tags |
---|
Lest We Remember: Cold Boot Attacks on Encryption Keys | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandr | pdf | 2008 | en | 2.87 MB | coldboot.pdf | USENIX Security Symposium 2008 | http://citp.princeton.edu/pub/co... | 2009-06-21 | Security RAM Encryption DRAM Cold Boot Key USENIX honeyblog |
The Impact of Incentives on Notice and Take-down | Tyler Moore, Richard Clayton | pdf | 2008 | en | 352.14 K | MooreImpact.pdf | found on http://honeyblog.org | http://weis2008.econinfosec.org/... | 2009-06-21 | Security fast-flux Spam Malware Virus Trojan |
Do Data Breach Disclosure Laws Reduce Identity Theft? | Sasha Romanosky, Rahul Telang, Alessandro Acquisti | pdf | 2008 | en | 244.56 K | Romanosky.pdf | found on http://honeyblog.org | http://weis2008.econinfosec.org/... | 2009-06-21 | Security Data breach disclosure economics information identity theft fixed-effects regression honeyblog |
Malicious Software (Malware): A Security Threat to the Internet Economy | OECD | pdf | 2008 | en | 1.69 MB | 40724457.pdf | Ministerial Background Report DSTI/ICCP/REG(2007)5/FINAL | http://www.oecd.org/dataoecd/53/... | 2009-06-21 | Security Spam Malware Virus Trojan Botnet OECD honeyblog |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling | pdf | 2008 | en | 592.29 K | storm-leet08.pdf | found on http://honeyblog.org | http://honeyblog.org/junkyard/pa... | 2009-06-21 | Security Spam Malware Virus Trojan Botnet Storm Worm honeyblog |
Security Economics and European Policy | Ross Anderson, Rainer Böhme, Richard Clayton, Tyler Moore | pdf | 2008 | en | 1.03 MB | MooreSecurity.pdf | found on http://honeyblog.org | http://weis2008.econinfosec.org/... | 2009-06-21 | Security honeyblog |
SAC 025: SSAC Advisory on Fast Flux Hosting and DNS | ICANN | pdf | 2008 | en | 169.22 K | sac025.pdf | found on http://honeyblog.org | http://www.icann.org/en/committe... | 2009-06-21 | Security fast-flux Malware Virus Trojan honeyblog DNS ICANN SSAC |
Studying Malicious Websites and the Underground Economy on the Chinese Web | Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou | pdf | 2008 | en | 476.21 K | www-china-WEIS08.pdf | found on http://honeyblog.org | http://honeyblog.org/junkyard/pa... | 2009-06-21 | Security Malware Virus Trojan honeyblog website Underground Economy China |
Measuring and Detecting Fast-Flux Service Networks | Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling | pdf | 2008 | en | 451.84 K | fast-flux-ndss08.pdf | found on http://honeyblog.org | https://pi1.informatik.uni-mannheim.de/filepool/research/publications/fast-flux-ndss08.pdf | 2009-06-21 | Security fast-flux Malware Virus Trojan honeyblog DNS |
Security Economics and The Internal Market | Ross Anderson, Rainer Böhme, Richard Clayton, Tyler Moore | pdf | 2009 | en | 1.61 MB | report_sec_econ_&_int_mar... | found on http://honeyblog.org | http://www.enisa.europa.eu/doc/p... | 2009-06-21 | Security Malware Virus Trojan honeyblog Economy |
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou | pdf | 2008 | en | 649.17 K | honeybow-ICICS07.pdf | found on http://honeyblog.org | http://honeyblog.org/junkyard/pa... | 2009-06-21 | Security Malware Virus Trojan honeyblog Honeypot |
Characterizing the IRC-based Botnet Phenomenon | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zou | pdf | 2007 | en | 329.52 K | botnet-china-TR.pdf | found on http://honeyblog.org | http://honeyblog.org/junkyard/re... | 2009-06-21 | Security Malware Virus Trojan Botnet honeyblog IRC |
Botnets - The Silent Threat | David Barroso | pdf | 2007 | en | 413.57 K | enisa_pp_botnets.pdf | found on http://honeyblog.org | http://www.enisa.europa.eu/doc/p... | 2009-06-21 | Security Malware Virus Trojan Botnet honeyblog ENISA |
Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch Malware | Laura Anna Itzel | pdf | 2007 | de | 2.06 MB | diplomarbeit-2007-itzel.p... | ound on http://honeyblog.org | http://pi1.informatik.uni-mannhe... | 2009-06-21 | Security Malware Virus Trojan honeyblog Honeypot Diplomarbeit |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage | pdf | 2007 | en | 348.12 K | miscreant-wealth.ccs07.pd... | found on http://honeyblog.org | http://www.icir.org/vern/papers/... | 2009-06-21 | Security Internet Underground Measurement Markets E-crime |
Know Your Enemy: Malicious Web Servers | The Honeynet Project - Christian Seifert, Ramon Steenson, Thorsten Holz, Bing Yuan, Michael A. Davis | pdf | 2007 | en | 1.07 MB | KYE-Malicious_Web_Servers... | found on http://honeynet.org | http://honeynet.org/papers/mws/K... | 2009-06-21 | Security Internet Malware Honeynet Webserver |
Know Your Enemy: Fast-Flux Service Networks | The Honeynet Project & Research Alliance | pdf | 2007 | en | 479.52 K | fast-flux.pdf | found on http://honeynet.org | http://honeynet.org/papers/ff/fa... | 2009-06-21 | Security network Internet fast-flux Malware E-crime |
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients | Ali Ikinci, Thorsten Holz, Felix Freiling | pdf | 2007 | en | 183.18 K | monkey-spider-Sicherheit0... | found on http://honeyblog.org | http://honeyblog.org/junkyard/pa... | 2009-06-21 | Security Internet Malware honeyblog Honeypot |
The Effect of Stock Spam on Financial Markets - WORKING PAPER | Rainer Böhme, Thorsten Holz | pdf | 2006 | en | 410.44 K | SSRN-id897431.pdf | found on http://honeyblog.org | http://ssrn.com/abstract=897431 | 2009-06-21 | Security Spam Malware honeyblog stock |