Library

Title Date File Type

RAMBO: Run-time packer Analysis with Multiple Branch Observation

Xabier Ugarte-Pedrero, Davide Balzarotti, , Igor Santos, and Pablo G. Bringas
2016-07-07 PDF

Function Identification and Recovery Signature Tool

Angel M. Villegas
2016-10-19 pdf

Subverting Operating System Properties through Evolutionary DKOM Attacks

Mariano Graziano, Lorenzo Flore, Andrea Lanzi, and Davide Balzarotti
2016-07-07 pdf

ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks

Mariano Graziano, Davide Balzarotti, and Alain Zidouemba
2016-05-30 pdf

Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware

Talos
2014-04-01 pdf

Deconstructing and Defending Against Group 72

Andrea Allievi, Joel Esler, Douglas Goddard, Shaun Hurley, Martin Lee, Craig Williams, and Alain Zidouemba.
2014-11-11 pdf

Threat Spotlight: Cisco Talos Thwarts Access to Massive International Exploit Kit Generating $60M Annually From Ransomware Alone

Nick Biasini with contributions from Joel Esler, Warren Mercer, Melissa Taylor, and Craig Williams
2015-10-06 html

Hacking the Belkin E Series Omniview 2-Port KVM Switch

Ian Payton
2017-04-06 pdf

Zeus Trojan Analysis

Alex Kirk
2015-03-09 html

Threat Spotlight: Angler Lurking in the Domain Shadows

Talos
2015-04-30 pdf

CryptoWall 4: The Evolution Continues

Andrea Allievi and Holger Unterbrink with contributions from Warren Mercer
2016-04-20 pdf

Protecting Windows and Mac Users Against the “Kyle and Stan” Malvertising Network

Shaun Hurley, David McDaniel, and Armin Pelkmann
2015-10-02 pdf

Content-Type Mismatch Detection

Alex Kirk
2010-01-01 html

ROKRAT Whitepaper: A sophisticated malware campaign targeting South Korean government officials involved in reunification

Warren Mercer, Paul Rascagneres, Matthew Molyett
2017-06-02 pdf

Take the RIG Pill Down the Rabbit Hole

By Holger Unterbrink, with contributions by Christopher Marczewski
2017-06-20 pdf
Title Date File Type

Subverting Operating System Properties through Evolutionary DKOM Attacks Presentation

Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti
2016-07-07 pdf

Go Speed Tracer

Richard Johnson
2016-05-30 pdf

ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks Presentation

Mariano Graziano, Davide Balzarotti, Alain Zidouemba
2016-03-30 pdf

Exploit Kits: Hunting the Hunters Presentation

Nick Biasini
2016-05-01 pdf

Improving Software Security with Dynamic Binary Instrumentation

Richard Johnson
2011-11-01 pdf

Characteristics and Detection of HTTP C&C Channels

Alex Kirk
2011-11-09 pdf

Razorback Framework

Richard Johnson
2011-11-01 pdf

Taint Nobody Got Time for Crash Analysis

Richard Johnson
2011-11-01 pdf

Detecting Obfuscated Malicious JavaScript with Snort and Razorback

Alex Kirk
2010-11-01 pdf

A Close Look at Rogue Antivirus Programs

Alain Zidouemba
2011-06-01 pdf

A Castle Made of Sand: Adobe Reader X Sandbox

Richard Johnson
2011-11-01 pdf

Harder, Better, Faster, Stronger: Semi-automatic Vulnerability Research

Talos
2011-11-01 pdf

Function Identification and Recovery Signature Tool Presentation

Angel M. Villegas
2016-11-01 pdf

Fuzzing and Patch Analysis: Sagely Advice

Richard Johnson, Pawel Janic (Emeritus)
2015-10-02 PDF

RAMBO: Run-time packer Analysis with Multiple Branch Observation

Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo G. Bringas
2016-07-07 pdf

BASS - Automated Signature Synthesizer

Jonas Zaddach and Mariano Graziano.
2017-06-19 pdf