Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
Lest We Remember: Cold Boot Attacks on Encryption KeysJ. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrpdf2008en2.87 MBcoldboot.pdfUSENIX Security Symposium 2008http://citp.princeton.edu/pub/co...2009-06-21Security RAM Encryption DRAM Cold Boot Key USENIX honeyblog
The Impact of Incentives on Notice and Take-downTyler Moore, Richard Claytonpdf2008en352.14 KMooreImpact.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security fast-flux Spam Malware Virus Trojan
Do Data Breach Disclosure Laws Reduce Identity Theft?Sasha Romanosky, Rahul Telang, Alessandro Acquistipdf2008en244.56 KRomanosky.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security Data breach disclosure economics information identity theft fixed-effects regression honeyblog
Malicious Software (Malware): A Security Threat to the Internet EconomyOECDpdf2008en1.69 MB40724457.pdfMinisterial Background Report DSTI/ICCP/REG(2007)5/FINALhttp://www.oecd.org/dataoecd/53/...2009-06-21Security Spam Malware Virus Trojan Botnet OECD honeyblog
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freilingpdf2008en592.29 Kstorm-leet08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Spam Malware Virus Trojan Botnet Storm Worm honeyblog
Security Economics and European PolicyRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moorepdf2008en1.03 MBMooreSecurity.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security honeyblog
SAC 025: SSAC Advisory on Fast Flux Hosting and DNSICANNpdf2008en169.22 Ksac025.pdffound on http://honeyblog.orghttp://www.icann.org/en/committe...2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS ICANN SSAC
Studying Malicious Websites and the Underground Economy on the Chinese WebJianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zoupdf2008en476.21 Kwww-china-WEIS08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog website Underground Economy China
Measuring and Detecting Fast-Flux Service NetworksThorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freilingpdf2008en451.84 Kfast-flux-ndss08.pdffound on http://honeyblog.orghttps://pi1.informatik.uni-mannheim.de/filepool/research/publications/fast-flux-ndss08.pdf2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS
Security Economics and The Internal MarketRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moorepdf2009en1.61 MBreport_sec_econ_&_int_mar...found on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan honeyblog Economy
Collecting Autonomous Spreading Malware Using High-Interaction HoneypotsJianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zoupdf2008en649.17 Khoneybow-ICICS07.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog Honeypot
Characterizing the IRC-based Botnet PhenomenonJianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zoupdf2007en329.52 Kbotnet-china-TR.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/re...2009-06-21Security Malware Virus Trojan Botnet honeyblog IRC
Botnets - The Silent ThreatDavid Barrosopdf2007en413.57 Kenisa_pp_botnets.pdffound on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan Botnet honeyblog ENISA
Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch MalwareLaura Anna Itzelpdf2007de2.06 MBdiplomarbeit-2007-itzel.p...ound on http://honeyblog.orghttp://pi1.informatik.uni-mannhe...2009-06-21Security Malware Virus Trojan honeyblog Honeypot Diplomarbeit
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJason Franklin, Adrian Perrig, Vern Paxson, Stefan Savagepdf2007en348.12 Kmiscreant-wealth.ccs07.pd...found on http://honeyblog.orghttp://www.icir.org/vern/papers/...2009-06-21Security Internet Underground Measurement Markets E-crime
Know Your Enemy: Malicious Web ServersThe Honeynet Project - Christian Seifert, Ramon Steenson, Thorsten Holz, Bing Yuan, Michael A. Davispdf2007en1.07 MBKYE-Malicious_Web_Servers...found on http://honeynet.orghttp://honeynet.org/papers/mws/K...2009-06-21Security Internet Malware Honeynet Webserver
Know Your Enemy: Fast-Flux Service NetworksThe Honeynet Project & Research Alliancepdf2007en479.52 Kfast-flux.pdffound on http://honeynet.orghttp://honeynet.org/papers/ff/fa...2009-06-21Security network Internet fast-flux Malware E-crime
Monkey-Spider: Detecting Malicious Websites with Low-Interaction HoneyclientsAli Ikinci, Thorsten Holz, Felix Freilingpdf2007en183.18 Kmonkey-spider-Sicherheit0...found on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Internet Malware honeyblog Honeypot
The Effect of Stock Spam on Financial Markets - WORKING PAPER Rainer Böhme, Thorsten Holzpdf2006en410.44 KSSRN-id897431.pdffound on http://honeyblog.orghttp://ssrn.com/abstract=8974312009-06-21Security Spam Malware honeyblog stock