text
stringlengths
4
429
Mar.
Jul. 2013, accessed: 8-August-2013. [Online]. Available: 2012, accessed: 4-August-2013. [Online]. Available:
http://bit.ly/1fzNcHl http://bit.ly/HSCRet
[14] S. Wolchok, R. Yao, and J. A. Halderman,
Analysis of [34]
New Wave of Facebook Phishing Attacks Targets
the Green Dam Censorware System,
Tech. Rep., 2009. Syrian Activists,
Apr. 2012, accessed: 4-August-2013.
[15] F. Li, A. Lai, and D. Ddl,
Evidence of Advanced Persis- [Online]. Available: http://bit.ly/1hDQsG8
tent Threat: A case study of malware for political espi- [35]
Pro-Syrian Government Hackers Target Activists
onage,
in MALWARE, 2011. With Fake Anti-Hacking Tool,
Aug. 2012, accessed:
[16]
Default https access for Gmail,
2010, accessed: 7- 4-August-2013. [Online]. Available: http://bit.ly/1eJj12T
August-2013. [Online]. Available: http://bit.ly/1bBktPM [36] J. Scott-Railton and M. Marquis-Boire,
A Call to Harm:
[17]
Making Twitter more secure: HTTPS,
2011, accessed: New Malware Attacks Target the Syrian Opposition,
7-August-2013. [Online]. Available: http://bit.ly/1i7l9kM Citizen Lab, Tech. Rep., Jun. 2013, accessed: 3-August-
2013. [Online]. Available: http://bit.ly/1a2l9PK
[18] L. Constantin,
Facebook to roll out HTTPS by default
to all users,
2012, accessed: 7-August-2013. [Online]. [37] E. Galperin and M. Marquis-Boire,
Trojan Hidden
Available: http://bit.ly/1bsLBCm in Fake Revolutionary Documents Targets Syrian Ac-
tivists,
May 2012, accessed: 4-August-2013. [Online].
[19]
FinFisher: Governmental IT Intrusion and Remote
Available: http://bit.ly/1cSJT0
Monitoring Solutions,
accessed: 12-November-2013.
[Online]. Available: http://bit.ly/1840Lxn [38] M. Marquis-Boire and S. Hardy,
Syrian Activists Tar-
geted with BlackShades Spy Software,
Jun. 2012,
[20]
BlackBerry rogue software leaves sour taste in UAE,
accessed: 12-November-2013. [Online]. Available:
2013, accessed: 11-November-2013. [Online]. Available:
http://bit.ly/1a2l6mX
http://on.ft.com/HVXvJP
[39] S. Fagerland,
The Syrian Spyware,
Feb. 2012,
[21] Mandiant,
The Advanced Persistent Threat,
2010.
accessed: 4-August-2013. [Online]. Available:
[22]
APT1: Exposing One of China
s Cyber Espionage http://bit.ly/HLyGR9
Units,
2013.
[40] Telecomix,
REPORT of a Syrian spyware,
p. 9, Feb.
[23] S. Fagerland, M. Krakvik, J. Camp, and N. Moran,
Op- 2012, accessed: 4-August-2013. [Online]. Available:
eration Hangover: Unveiling an Indian Cyberattack In- http://bit.ly/1bsNcIk
frastructure,
2013.
[41] S. Faris,
The Hackers of Damascus,
Nov.
[24] R. Deibert and R. Rohozinski,
Tracking GhostNet: In- 2012, accessed: 9-August-2013. [Online]. Available:
vestigating a Cyber Espionage Network,
Information http://buswk.co/17t8RRH
Warfare Monitor, p. 6, 2009. [42] L. Aylward,
Malware Analysis
Dark Comet RAT,
[25] S. Nagaraja and R. Anderson,
The snooping dragon: Nov. 2011, accessed: 4-August-2013. [Online]. Avail-
social-malware surveillance of the Tibetan movement,
able: http://bit.ly/16ZXgag
Tech. Rep., 2009. [43] Quequero,
DarkComet Analysis
Understanding the
[26] F. C. Solutions,
njRAT
Uncovered,
2013, accessed: Trojan used in Syrian Uprising,
Mar. 2012, accessed:
25-June-2013. [Online]. Available: http://bit.ly/1eJheel 4-August-2013. [Online]. Available: http://bit.ly/19i6kEl
13
USENIX Association
23rd USENIX Security Symposium
523
[44] S. Denbow and J. Hertz,
Pest Control: Taming the [63]
Ultimate Packer for eXecutables,
ac-