text
stringlengths 4
429
|
---|
Mar. |
Jul. 2013, accessed: 8-August-2013. [Online]. Available: 2012, accessed: 4-August-2013. [Online]. Available: |
http://bit.ly/1fzNcHl http://bit.ly/HSCRet |
[14] S. Wolchok, R. Yao, and J. A. Halderman, |
Analysis of [34] |
New Wave of Facebook Phishing Attacks Targets |
the Green Dam Censorware System, |
Tech. Rep., 2009. Syrian Activists, |
Apr. 2012, accessed: 4-August-2013. |
[15] F. Li, A. Lai, and D. Ddl, |
Evidence of Advanced Persis- [Online]. Available: http://bit.ly/1hDQsG8 |
tent Threat: A case study of malware for political espi- [35] |
Pro-Syrian Government Hackers Target Activists |
onage, |
in MALWARE, 2011. With Fake Anti-Hacking Tool, |
Aug. 2012, accessed: |
[16] |
Default https access for Gmail, |
2010, accessed: 7- 4-August-2013. [Online]. Available: http://bit.ly/1eJj12T |
August-2013. [Online]. Available: http://bit.ly/1bBktPM [36] J. Scott-Railton and M. Marquis-Boire, |
A Call to Harm: |
[17] |
Making Twitter more secure: HTTPS, |
2011, accessed: New Malware Attacks Target the Syrian Opposition, |
7-August-2013. [Online]. Available: http://bit.ly/1i7l9kM Citizen Lab, Tech. Rep., Jun. 2013, accessed: 3-August- |
2013. [Online]. Available: http://bit.ly/1a2l9PK |
[18] L. Constantin, |
Facebook to roll out HTTPS by default |
to all users, |
2012, accessed: 7-August-2013. [Online]. [37] E. Galperin and M. Marquis-Boire, |
Trojan Hidden |
Available: http://bit.ly/1bsLBCm in Fake Revolutionary Documents Targets Syrian Ac- |
tivists, |
May 2012, accessed: 4-August-2013. [Online]. |
[19] |
FinFisher: Governmental IT Intrusion and Remote |
Available: http://bit.ly/1cSJT0 |
Monitoring Solutions, |
accessed: 12-November-2013. |
[Online]. Available: http://bit.ly/1840Lxn [38] M. Marquis-Boire and S. Hardy, |
Syrian Activists Tar- |
geted with BlackShades Spy Software, |
Jun. 2012, |
[20] |
BlackBerry rogue software leaves sour taste in UAE, |
accessed: 12-November-2013. [Online]. Available: |
2013, accessed: 11-November-2013. [Online]. Available: |
http://bit.ly/1a2l6mX |
http://on.ft.com/HVXvJP |
[39] S. Fagerland, |
The Syrian Spyware, |
Feb. 2012, |
[21] Mandiant, |
The Advanced Persistent Threat, |
2010. |
accessed: 4-August-2013. [Online]. Available: |
[22] |
APT1: Exposing One of China |
s Cyber Espionage http://bit.ly/HLyGR9 |
Units, |
2013. |
[40] Telecomix, |
REPORT of a Syrian spyware, |
p. 9, Feb. |
[23] S. Fagerland, M. Krakvik, J. Camp, and N. Moran, |
Op- 2012, accessed: 4-August-2013. [Online]. Available: |
eration Hangover: Unveiling an Indian Cyberattack In- http://bit.ly/1bsNcIk |
frastructure, |
2013. |
[41] S. Faris, |
The Hackers of Damascus, |
Nov. |
[24] R. Deibert and R. Rohozinski, |
Tracking GhostNet: In- 2012, accessed: 9-August-2013. [Online]. Available: |
vestigating a Cyber Espionage Network, |
Information http://buswk.co/17t8RRH |
Warfare Monitor, p. 6, 2009. [42] L. Aylward, |
Malware Analysis |
Dark Comet RAT, |
[25] S. Nagaraja and R. Anderson, |
The snooping dragon: Nov. 2011, accessed: 4-August-2013. [Online]. Avail- |
social-malware surveillance of the Tibetan movement, |
able: http://bit.ly/16ZXgag |
Tech. Rep., 2009. [43] Quequero, |
DarkComet Analysis |
Understanding the |
[26] F. C. Solutions, |
njRAT |
Uncovered, |
2013, accessed: Trojan used in Syrian Uprising, |
Mar. 2012, accessed: |
25-June-2013. [Online]. Available: http://bit.ly/1eJheel 4-August-2013. [Online]. Available: http://bit.ly/19i6kEl |
13 |
USENIX Association |
23rd USENIX Security Symposium |
523 |
[44] S. Denbow and J. Hertz, |
Pest Control: Taming the [63] |
Ultimate Packer for eXecutables, |
ac- |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.