Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
Lest We Remember: Cold Boot Attacks on Encryption KeysJ. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrpdf2008en2.87 MBcoldboot.pdfUSENIX Security Symposium 2008http://citp.princeton.edu/pub/co...2009-06-21Security RAM Encryption DRAM Cold Boot Key USENIX honeyblog
Do Data Breach Disclosure Laws Reduce Identity Theft?Sasha Romanosky, Rahul Telang, Alessandro Acquistipdf2008en244.56 KRomanosky.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security Data breach disclosure economics information identity theft fixed-effects regression honeyblog
Malicious Software (Malware): A Security Threat to the Internet EconomyOECDpdf2008en1.69 MB40724457.pdfMinisterial Background Report DSTI/ICCP/REG(2007)5/FINALhttp://www.oecd.org/dataoecd/53/...2009-06-21Security Spam Malware Virus Trojan Botnet OECD honeyblog
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freilingpdf2008en592.29 Kstorm-leet08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Spam Malware Virus Trojan Botnet Storm Worm honeyblog
Security Economics and European PolicyRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moorepdf2008en1.03 MBMooreSecurity.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security honeyblog
SAC 025: SSAC Advisory on Fast Flux Hosting and DNSICANNpdf2008en169.22 Ksac025.pdffound on http://honeyblog.orghttp://www.icann.org/en/committe...2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS ICANN SSAC
Studying Malicious Websites and the Underground Economy on the Chinese WebJianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zoupdf2008en476.21 Kwww-china-WEIS08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog website Underground Economy China
Measuring and Detecting Fast-Flux Service NetworksThorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freilingpdf2008en451.84 Kfast-flux-ndss08.pdffound on http://honeyblog.orghttps://pi1.informatik.uni-mannheim.de/filepool/research/publications/fast-flux-ndss08.pdf2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS
Security Economics and The Internal MarketRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moorepdf2009en1.61 MBreport_sec_econ_&_int_mar...found on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan honeyblog Economy
Collecting Autonomous Spreading Malware Using High-Interaction HoneypotsJianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zoupdf2008en649.17 Khoneybow-ICICS07.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog Honeypot
Characterizing the IRC-based Botnet PhenomenonJianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zoupdf2007en329.52 Kbotnet-china-TR.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/re...2009-06-21Security Malware Virus Trojan Botnet honeyblog IRC
Botnets - The Silent ThreatDavid Barrosopdf2007en413.57 Kenisa_pp_botnets.pdffound on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan Botnet honeyblog ENISA
Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch MalwareLaura Anna Itzelpdf2007de2.06 MBdiplomarbeit-2007-itzel.p...ound on http://honeyblog.orghttp://pi1.informatik.uni-mannhe...2009-06-21Security Malware Virus Trojan honeyblog Honeypot Diplomarbeit
Monkey-Spider: Detecting Malicious Websites with Low-Interaction HoneyclientsAli Ikinci, Thorsten Holz, Felix Freilingpdf2007en183.18 Kmonkey-spider-Sicherheit0...found on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Internet Malware honeyblog Honeypot
The Effect of Stock Spam on Financial Markets - WORKING PAPER Rainer Böhme, Thorsten Holzpdf2006en410.44 KSSRN-id897431.pdffound on http://honeyblog.orghttp://ssrn.com/abstract=8974312009-06-21Security Spam Malware honeyblog stock