text
stringlengths 4
429
|
---|
Mar.
|
Jul. 2013, accessed: 8-August-2013. [Online]. Available: 2012, accessed: 4-August-2013. [Online]. Available:
|
http://bit.ly/1fzNcHl http://bit.ly/HSCRet
|
[14] S. Wolchok, R. Yao, and J. A. Halderman,
|
Analysis of [34]
|
New Wave of Facebook Phishing Attacks Targets
|
the Green Dam Censorware System,
|
Tech. Rep., 2009. Syrian Activists,
|
Apr. 2012, accessed: 4-August-2013.
|
[15] F. Li, A. Lai, and D. Ddl,
|
Evidence of Advanced Persis- [Online]. Available: http://bit.ly/1hDQsG8
|
tent Threat: A case study of malware for political espi- [35]
|
Pro-Syrian Government Hackers Target Activists
|
onage,
|
in MALWARE, 2011. With Fake Anti-Hacking Tool,
|
Aug. 2012, accessed:
|
[16]
|
Default https access for Gmail,
|
2010, accessed: 7- 4-August-2013. [Online]. Available: http://bit.ly/1eJj12T
|
August-2013. [Online]. Available: http://bit.ly/1bBktPM [36] J. Scott-Railton and M. Marquis-Boire,
|
A Call to Harm:
|
[17]
|
Making Twitter more secure: HTTPS,
|
2011, accessed: New Malware Attacks Target the Syrian Opposition,
|
7-August-2013. [Online]. Available: http://bit.ly/1i7l9kM Citizen Lab, Tech. Rep., Jun. 2013, accessed: 3-August-
|
2013. [Online]. Available: http://bit.ly/1a2l9PK
|
[18] L. Constantin,
|
Facebook to roll out HTTPS by default
|
to all users,
|
2012, accessed: 7-August-2013. [Online]. [37] E. Galperin and M. Marquis-Boire,
|
Trojan Hidden
|
Available: http://bit.ly/1bsLBCm in Fake Revolutionary Documents Targets Syrian Ac-
|
tivists,
|
May 2012, accessed: 4-August-2013. [Online].
|
[19]
|
FinFisher: Governmental IT Intrusion and Remote
|
Available: http://bit.ly/1cSJT0
|
Monitoring Solutions,
|
accessed: 12-November-2013.
|
[Online]. Available: http://bit.ly/1840Lxn [38] M. Marquis-Boire and S. Hardy,
|
Syrian Activists Tar-
|
geted with BlackShades Spy Software,
|
Jun. 2012,
|
[20]
|
BlackBerry rogue software leaves sour taste in UAE,
|
accessed: 12-November-2013. [Online]. Available:
|
2013, accessed: 11-November-2013. [Online]. Available:
|
http://bit.ly/1a2l6mX
|
http://on.ft.com/HVXvJP
|
[39] S. Fagerland,
|
The Syrian Spyware,
|
Feb. 2012,
|
[21] Mandiant,
|
The Advanced Persistent Threat,
|
2010.
|
accessed: 4-August-2013. [Online]. Available:
|
[22]
|
APT1: Exposing One of China
|
s Cyber Espionage http://bit.ly/HLyGR9
|
Units,
|
2013.
|
[40] Telecomix,
|
REPORT of a Syrian spyware,
|
p. 9, Feb.
|
[23] S. Fagerland, M. Krakvik, J. Camp, and N. Moran,
|
Op- 2012, accessed: 4-August-2013. [Online]. Available:
|
eration Hangover: Unveiling an Indian Cyberattack In- http://bit.ly/1bsNcIk
|
frastructure,
|
2013.
|
[41] S. Faris,
|
The Hackers of Damascus,
|
Nov.
|
[24] R. Deibert and R. Rohozinski,
|
Tracking GhostNet: In- 2012, accessed: 9-August-2013. [Online]. Available:
|
vestigating a Cyber Espionage Network,
|
Information http://buswk.co/17t8RRH
|
Warfare Monitor, p. 6, 2009. [42] L. Aylward,
|
Malware Analysis
|
Dark Comet RAT,
|
[25] S. Nagaraja and R. Anderson,
|
The snooping dragon: Nov. 2011, accessed: 4-August-2013. [Online]. Avail-
|
social-malware surveillance of the Tibetan movement,
|
able: http://bit.ly/16ZXgag
|
Tech. Rep., 2009. [43] Quequero,
|
DarkComet Analysis
|
Understanding the
|
[26] F. C. Solutions,
|
njRAT
|
Uncovered,
|
2013, accessed: Trojan used in Syrian Uprising,
|
Mar. 2012, accessed:
|
25-June-2013. [Online]. Available: http://bit.ly/1eJheel 4-August-2013. [Online]. Available: http://bit.ly/19i6kEl
|
13
|
USENIX Association
|
23rd USENIX Security Symposium
|
523
|
[44] S. Denbow and J. Hertz,
|
Pest Control: Taming the [63]
|
Ultimate Packer for eXecutables,
|
ac-
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.