text
stringlengths
4
429
RATs,
p. 14, accessed: 12-November-2013. [Online]. cessed: 27-February-2014. [Online]. Available:
Available: http://bit.ly/1fzLA0m http://upx.sourceforge.net/
[45] B. Brumfield,
Computer spyware is newest weapon in [64]
CVE-2013-0422,
accessed: 27-February-2014. [On-
Syrian conflict,
Feb. 2012, accessed: 4-August-2013. line]. Available: http://bit.ly/NA1O0A
[Online]. Available: http://cnn.it/HLz5TA [65] njq8,
New java drive-by 2013-1-11,
2013, accessed:
[46]
jalnosra.com,
accessed: 27-February-2014. [Online]. 27-February-2014. [Online]. Available: http://www.dev-
Available: jalnosra.com point.com/vb/t357796.html
[47]
Skype Encryption.wmv,
accessed: 27-February-2014. [66]
Appin Technology Lab,
accessed: 27-February-2014.
[Online]. Available: http://bit.ly/HZ3e1y [Online]. Available: http://www.appinonline.com/
[48] E. Galperin and M. Marquis-Boire,
The Internet [67] C. Guarnieri,
Analysis of the FinFisher Lawful
is Back in Syria and So is Malware Targeting Interception Malware,
2012, accessed: 7-August-2013.
Syrian Activists,
Dec. 2012, accessed: 4-August-2013. [Online]. Available: http://bit.ly/1eJjVMV
[Online]. Available: http://bit.ly/1bngqFc [68] H. Moore,
Critical Research: Internet Security Survey,
[49]
Free Syrian Army Sex Tape
Abdul Razzaq Tlass 2012.
[NSFW],
accessed: 5-August-2013. [Online]. Available: [69]
Democracy Index 2012: Democracy at a Standstill,
http://bit.ly/1gHqDDH 2012, accessed: 7-August-2013. [Online]. Available:
[50] A. Lund,
Holy Warriors: A field guide to Syria
s jihadi http://bit.ly/HSEDMD
groups,
Oct. 2012, accessed: 5-August-2013. [Online]. [70]
YARA - The pattern matching swiss knife for malware
Available: http://atfp.co/17t8yq5 researchers,
accessed: 27-February-2014. [Online].
Available: http://plusvic.github.io/yara/
[51]
Ahmed Mansoor and Four Other Pro-Democracy
Activists Pardoned and Freed,
2013, ac- [71]
Cross-platform Trojan controls Windows and Mac
cessed: 10-November-2013. [Online]. Available: machines,
2012, accessed: 7-August-2013. [Online].
http://bit.ly/18pHpis Available: http://bit.ly/1eJnJgZ
[52]
Royal Group,
accessed: 27-February-2014. [Online]. [72] S. Golovanov,
Adobe Flash Player 0-day and Hack-
Available: http://www.royalgroupuae.com/ ingTeam
s Remote Control System,
2013, accessed:
7-August-2013. [Online]. Available: http://bit.ly/17n12ro
[53] T. Katsuki,
Crisis for Windows Sneaks onto Virtual
Machines,
2012, accessed: 27-February-2014. [Online]. [73]
Internet Census 2012,
2013, accessed: 7-August-2013.
Available: http://bit.ly/MzheRJ [Online]. Available: http://bit.ly/1i7rRHs
[74] Z. Durumeric, E. Wustrow, and J. A. Halderman,
ZMap:
[54]
Hacking Team,
accessed: 27-February-2014. [Online].
Fast Internet-Wide Scanning and its Security Applica-
Available: http://www.hackingteam.it/
tions,
in USENIX Security, Aug. 2013.
[55]
MPRESS,
accessed: 27-February-2014. [Online].
[75]
Home of Crossbear and OONIBear,
ac-
Available: http://www.matcode.com/mpress.htm
cessed: 27-February-2014. [Online]. Available:
[56]
Sign in using application-specific passwords,
ERROR: type should be string, got " https://pki.net.in.tum.de/"
accessed: 27-February-2014. [Online]. Available:
[76]
RIPE Database Query for FASTWEB-HT,
ac-
ERROR: type should be string, got " https://support.google.com/accounts/answer/185833?hl=en"
cessed: 27-February-2014. [Online]. Available:
[57] S. Fagerland,
Systematic cyber attacks against Is- http://bit.ly/MzkigV
raeli and Palestinian targets going on for a year,
[77]