Virus patrol: five years of scanning the USENET
|
|
AVIEN - what a trip!
|
|
Software restriction policies in Windows XP
|
Microsoft Corporation
|
TBC
|
|
Java 2 ME - a playground for malicious code?
|
|
What's the big idea?
|
Trend Micro, Inc.
|
The Win32 worms: classification and possibility of heuristic detection
|
|
A year of WormCatching
|
|
Fighting network worms in a large corporate environment
|
|
Malware in a small pot
|
Kaspersky Lab
|
What's next - prediciting the future by looking at the past
|
|
e-bugs: should anti-virus products detect them?
|
|
The administrator's guide to behaviour blocking
|
|
Are there any polymorphic macro viruses at all? (...and what to do with them)
|
|
How to use live viruses as an education tool
|
|
Heuristics: retrospective and future
|
|
The evolution of managing viruses in a large corporation
|
IBM
|
Booting the unbootable
|
|
Macro and script virus polymorphism
|
F-Secure
|
How to smell a RAT - remote administration tools vs backdoor Trojans
|
|
Remodelling the fortress: responding to new freedoms and new threats in 2002 and beyond
|
|
Sandbox II: Internet
|
|
Hidden under the hood - Linux backdoors
|
F-Secure
|
Unix malware analysis after break-in
|
|
The four faces of a virus researcher
|
|
Corporate anti-virus best practices
|
|
32-bit virus threats on 64-bit Windows
|
|
Cleaning up the mess: time to redefine 'disinfection'?
|
F-Secure
|
How squeaky are your wheels? - measuring the health of a user population
|
|
Computer viruses and the law
|
Stanford University
|
Blended attacks: exploits, vulnerabilites and buffer overflow techniques in computer viruses
|
|
Retrospective testing - how good heuristics really work
|
|
Evolution of an automated virus scanning system
|
Microsoft Corporation
|
Free anti-virus techniques
|
|