Форум программистов
 
Расширенный поиск
Контакты: о проблемах с регистрацией, почтой и по другим вопросам пишите сюда - alarforum@yandex.ru, проверяйте папку спам! Обязательно пройдите активизацию e-mail.

Вернуться   Форум программистов > Низкоуровневое программирование > Assembler
Регистрация

Восстановить пароль
Повторная активизация e-mail

Ответ
 
Опции темы
Старый 29.11.2016, 17:53   #41
rainboww1988
Пользователь
 
Аватар для rainboww1988
 
Регистрация: 29.11.2016
Адрес: планета Земля
Сообщений: 17
Репутация: 10
По умолчанию

Авторы книг: Юров, Голубь, Зубков. Это российские более-менее современные учебные пособия.
Также есть старинная книга, автор Скэнлон, программирование на IBM\XT, там еще для i8086 объясняется и хорошо расписана архитектура процика.
Для организации ЭВМ и машинных языков, можно для понимаю почитать Таненбаума Архитектура компьютера, чтобы понять смысл ЭВМ изнутри.
rainboww1988 вне форума   Ответить с цитированием
Старый 11.03.2017, 13:49   #42
Nif-naf
Пользователь
 
Аватар для Nif-naf
 
Регистрация: 05.09.2016
Сообщений: 28
Репутация: 10
По умолчанию

Хотелось узнать как там AsmUtils новая. Новых макросов у меня на русском нет. Где найти?
__________________
Немного о GoAsm.
Nif-naf вне форума   Ответить с цитированием
Старый 26.04.2017, 09:40   #43
Nif-naf
Пользователь
 
Аватар для Nif-naf
 
Регистрация: 05.09.2016
Сообщений: 28
Репутация: 10
По умолчанию

Вот ещё.Первая часть.
Вложения
Тип файла: rar masm.v4.part1.rar (2.00 Мб, 1 просмотров)
__________________
Немного о GoAsm.
Nif-naf вне форума   Ответить с цитированием
Старый 26.04.2017, 09:41   #44
Nif-naf
Пользователь
 
Аватар для Nif-naf
 
Регистрация: 05.09.2016
Сообщений: 28
Репутация: 10
По умолчанию

Вот ещё. Вторая.
Вложения
Тип файла: rar masm.v4.part2.rar (1.69 Мб, 0 просмотров)
__________________
Немного о GoAsm.
Nif-naf вне форума   Ответить с цитированием
Старый 31.05.2017, 12:03   #45
Viacheslav78
Новичок
 
Аватар для Viacheslav78
 
Регистрация: 16.02.2016
Адрес: Россия
Сообщений: 6
Репутация: 24
По умолчанию

Assembler:

Blum Richard. Professional Assembly Language.
Cavanagh Joseph. X86 Assembly Language and C Fundamentals.
Duntemann Jeff. Assembly Language Step-by-Step. Programming with Linux.
Irvine K.R. Assembly Language for x86 Processors. Seventh Edition.
Irvine K.R. Assembly Language for x86 Processors. Sixth Edition.
Kusswurm D. Modern X86 Assembly Language Programming. 32-bit, 64-bit, SSE, and AVX.
Leiterman J.C. 32-64-Bit 80x86 Assembly Language Architecture.
Neveln Bob. Linux Assembly Language Programming.
Rose Chris. Assembly Language Succinctly.
Seyfarth Ray. Introduction to 64 Bit Intel Assembly Language Programming for Linux.
Hyde R. The Art of Assembly Language (Second Edition).
Dandamudi S.P. Guide to Assembly Language Programming in Linux.

ARM:

Holt W. ARM Assembly Language. Fundamentals and Techniques.
Langbridge J.A. Professional Embedded ARM Development.
Tay Raymond. OpenCL Parallel Programming Development Cookbook.
Mahout Vincent. Assembly Language Programming ARM Cortex-M3.
Sloss Andrew N. Symes D. Wright C. ARM System Developers Guide. Designing and Optimizing System Software.
Valvano J.W. Embedded Systems. Introduction to Arm Cortex™-M Microcontrollers. Volume 1.
Yui J. The Definitive Guide to ARM Cortex-M0 and Cortex-M0+ Processors.

Debugging:

Bill Blunden. Software Exorcism. A Handbook for Debugging and Optimizing Legacy Code.
Brian W. Fitzpatrick. Debugging Teams. Better Productivity through Collaboration.
Butcher Paul. Debug It. Find, Repair, and Prevent Bugs in Your Code.
Cristina Cifuentes. Reverse Compilation Techniques.
Debugging Linux Systems with GNU GDB.
Eric Lawrence. Debugging with Fiddler. The complete reference from the creator of the Fiddler Web Debugger.
Mario Hewardt, Daniel Pravat. Advanced Windows Debugging.
Mario Hewardt. Advanced .NET Debugging.
Matthew A. Telles, Yuan Hsieh. The Science of Debugging.
Norman Matloff. Peter Jay Salzman. THE ART OF DEBUGGING WITH GDB, DDD, AND ECLIPSE.
Rajaram Regupathy. Bootstrap Yourself with Linux-USB Stack. Design, Develop, Debug, and Validate Embedded USB Systems.
Richard Foley. Pro Perl Debugging. From Professional to Expert.
Richard H. Carver, Kuo-Chung Tai. Modern Multithreading Implementing, Testing, and Debugging Multithreaded Java and C++ & Pthreads & Win32 Programs.
Richard Stallman, Roland Pesch, Stan Shebs, et al. Debugging with GDB - the GNU Source-Level Debugger.
Steve Maguire. Debugging the Development Process.
Tarik Soulami. Inside Windows Debugging. A Practical Guide to Debugging and Tracing Strategies in Windows.
Thorsten Grötker, Ulrich Holtmann, Holger Keding, Markus Wloka. The Developer's Guide to Debugging.

Vulnerability Analysis:

Abraham Ghebrehiwet Ghebremedhin. Combining Static Source Code Analysis and Threat Assessment Modeling For Testing Open Source Software Security.
Adam Loe Doup´e. Advanced Automated Web Application Vulnerability Analysis.
Antti Vayrynen. Finding third-party components with binary analysis.
David B. Dewey. FINDING AND REMEDYING HIGH-LEVEL SECURITY ISSUES IN BINARY CODE.
David Brumley. Analysis and Defense of Vulnerabilities in Binary Code.
Fabian Yamaguchi. Automated Extraction of API Usage Patterns from Source Code for Vulnerability Identification.
Fabian Yamaguchi. Pattern-Based Vulnerability Discovery.
Falko Strenzke. Efficiency and Implementation Security of Code-based Cryptosystems.
Francisco Jose Marques Vieira. Realistic Vulnerability Injections in PHP Web Applications.
George Perera. PURPOSEFULLY MANUFACTURED VULNERABILITIES IN U.S. GOVERNMENT TECHNOLOGY MICROCHIPS. RISKS AND HOMELAND SECURITY IMPLICATIONS.
Guidelines for Implementation of REST.
Gustav Ahlberg. Generating web applications containing XSS and CSRF vulnerabilities.
Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES.
Jing Xie. INTERACTIVE PROGRAMMING SUPPORT FOR SECURE SOFTWARE DEVELOPMENT.
Mario Heiderich. Towards Elimination of XSS Attacks with a Trusted and Capability Controlled DOM.
Martin Johns. Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting.
Prateek Saxena. Systematic Techniques for Finding and Preventing Systematic Techniques for Finding and Preventing.
Rami M. F. Jnena. Modern Approach for WEB Applications Vulnerability Analysis.
Richard Wartell. REWRITING X86 BINARIES WITHOUT CODE PRODUCER COOPERATION.
Runar Moen. Creating secure software.
Ryan Dewhurst. Implementing Basic Static Code Analysis into Integrated Development Environments (IDEs) to Reduce Software Vulnerabilities.
Sidney E Valentine. PLC Code Vulnerabilities Through SCADA Systems.
Sooel Son, B.S., M.S. Toward Better Server-side Web Security.
SRUTHI BANDHAKAVI. AUTOMATED DETECTION OF INJECTION VULNERABILITIES IN WEB APPLICATIONS.
Steven Craig Hanna Jr. Attacks on Emerging Architectures.
Thomas Hofer. Evaluating Static Source Code Analysis Tools.
Tyler Bletsch. Code-Reuse Attacks. New Frontiers and Defenses.
Wolf-Steffen Rodiger. Merging Static Analysis and Model Checking for Improved Security Vulnerability Detection.
Yuchen Zhou. Improving Security and Privacy of Integrated Web Applications.
Reverse Engineering
Bell Simon. Building a Honeypot to Research Cyber-Attack Techniques.
Bryant R. Adam. UNDERSTANDING HOW REVERSE ENGINEERS MAKE SENSE OF PROGRAMS FROM ASSEMBLY LANGUAGE REPRESENTATIONS.
Cipresso Teodoro. Software reverse engineering education.
Dyrkolbotn Geir Olav. Reverse Engineering Microprocessor Content Using Electromagnetic Radiation.
Fonseca Jose Manuel Rios. Interactive Decompilation.
Garzon Miguel. Reverse Engineering Object-Oriented Systems into Umple. An Incremental and Rule-Based Approach.
Greevy Orla. Enriching Reverse Engineering with Feature Analysis.
Hauke D. Jonathan. Design Verification Using Reverse Engineering.
Holger Michael Kienle. Building Reverse Engineering Tools with Software Components.
Kenny Wong. The Reverse Engineering Notebook.
Lajos Jeno Fülop. Evaluating and Improving Reverse Engineering Tools.
Lin Feifei (Amy). Analysing Reverse Engineering Techniques for Interactive Systems.
Michael Kiperberg. Preventing Reverse Engineering of Native and Managed Programs.
Morando Federico. SOFTWARE REVERSE ENGINEERING AND OPEN SOURCE SOFTWARE. Do we need more FUD to be satiated.
Portillo Sergio Pastrana. Attacks Against Intrusion Detection Networks. Evasion, Reverse Engineering and Optimal Countermeasures.
Prpic Martin. Reverse engineering of Java Card applets.
Ramasubbu Surendranath. Reverse Software Engineering Large Object Oriented Software Systems using the UML Notation.
Rosenblum Nathan E. THE PROVENANCE HIERARCHY OF COMPUTER PROGRAMS.
Shi Nija. Reverse Engineering of Design Patterns from Java Source Code.
UZELAC VLADIMIR. MICROBENCHMARKS AND MECHANISMS FOR REVERSE ENGINEERING OF MODERN BRANCH PREDICTOR UNITS.
Vinju Jurgen Jordanus. Analysis and Transformation of Source Code by Parsing and Rewriting.
Zhiqiang Lin. Reverse Engineering of Data Structures from Binary.
Viacheslav78 вне форума   Ответить с цитированием
Старый 31.05.2017, 12:05   #46
Viacheslav78
Новичок
 
Аватар для Viacheslav78
 
Регистрация: 16.02.2016
Адрес: Россия
Сообщений: 6
Репутация: 24
По умолчанию

Software Protection, Code Obfuscation, Malware Detection

Alam Shahid. A Framework for Metamorphic Malware Analysis and Real-Time Detection.
Alexandre Nuno Vicente Dias. Detecting Computer Viruses using GPUs.
Aniket Kulkarni. Software Protection through Code Obfuscation.
Batchelder R. Michael. JAVA BYTECODE OBFUSCATION.
Bertholon Benoit. Towards Integrity and Software Protection in Cloud Computing Platforms.
Birhanu Mekuria Eshete. Effective Analysis, Characterization, and Detection of Malicious Activities on the Web.
Blaine Alan Nelson. Designing, Implementing, and Analyzing a System for Virus Detection.
Bose Abhijit. Propagation, Detection and Containment of Mobile Malware.
Brian M. Bowen. Design and Analysis of Decoy Systems for Computer Security.
CAPPAERT Jan. Code Obfuscation Techniques for Software Protection.
DAVIDSON RODRIGO BOCCARDO. Context-Sensitive Analysis of x86 Obfuscated Executables.
Drape Stephen. INTELLECTUAL PROPERTY PROTECTION USING OBFUSCATION.
Drape Stephen. Obfuscation of Abstract Data-Types.
Farley, Ryan Joseph. Toward Automated Forensic Analysis of Obfuscated Malware.
Flexeder Andrea. Interprocedural Analysis of Low-Level Code.
Gupta, Divya. Program Obfuscation. Applications and Optimizations.
HILLERT EMILIA.Obfuscate Java bytecode. An evaluation of obfuscating transformations using JBCO.
Javaid Salman. Analysis and Detection of Heap-based Malwares Using Introspection in a Virtualized Environment.
Khaled ElWazeer. DEEP ANALYSIS OF BINARY CODE TO RECOVER PROGRAM STRUCTURE.
Khalid Mohamed Abdelrahman Y Alzarooni. Malware Variant Detection.
Kinder Johannes. Static Analysis of x86 Executables. Statische Analyse von Programmen in x86 Maschinensprache.
Konstantinou Evgenios. Metamorphic Virus. Analysis and Detection.
Lixi Chen. Code Obfuscation Techniques for Software Protection.
Large-Scale Malware Analysis, Detection, and Signature Generation.
Lengyel Tamas Kristof. Malware Collection and Analysis via Hardware Virtualization.
Mayank Varia. Studies in Program Obfuscation.
Mohan R. Vishwath. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE.
Molnar David Alexander. Dynamic Test Generation for Large Binary Programs.
Paleari Roberto. Dealing with next-generation malware.
Paul R. Nathanael. Disk-Level Behavioral Malware Detection.
Povalova Radoslava. Framework for Easy Malware Analysis.
Preda Mila Dalla. Code Obfuscation and Malware Detection by Abstract Interpretation.
Remi Andre B. Valvik. Security API for Java ME. Secure X data.
Richardson Christopher. Virus detection with machine learning.
RIERA FRANCISCO BLAS IZQUIERDO. LO! LLVM Obfuscator An LLVM obfuscator for binary patch generation.
Rompf Tiark. Lightweight Modular Staging and Embedded Compilers. Abstraction without Regret for High-Level High-Performance Programming.
Roundy A. Kevin. HYBRID ANALYSIS AND CONTROL OF MALICIOUS CODE.
Sabu Emmanuel. Software Obfuscation Presentation.
Shakya Sundar Das. Code Obfuscation using Code Splitting with Self-modifying Code.
Sharath K. Udupa, Saumya K. Debray and Matias Madou. Deobfuscation Reverse Engineering Obfuscated Code.
Sharif I. Monirul. ROBUST AND EFFICIENT MALWARE ANALYSIS AND HOST-BASED MONITORING.
SOLODKYY YURIY. SIMPLIFYING THE ANALYSIS OF C++ PROGRAMS.
Solofoarisina Arisoa Randrianasolo. Artficial Intelligence in Computer Security. Detection, Temporary Repair and Defense.
SUN FANGQI. Program Analyses of Web Applications for Detecting Application-Specific
Vulnerabilities.
Tian Ronghua. An Integrated Malware Detection and Classification System.
Venkatachalam Sujandharan. DETECTING UNDETECTABLE COMPUTER VIRUSES.
Victor van der Veen. Dynamic Analysis of Android Malware.
Wang Chenxi. A Security Architecture for Survivability Mechanisms.
Wroblewski Gregory. General Method of Program Code Obfuscation (draft).

LLVM

Arash Shahkar. ON MATCHING BINARY TO SOURCE CODE
Arjun Shah. Metamorphic Code Generator based on bytecode of LLVM IR
Christoph Erhardt. Design and Implementation of a TriCore Backend for the LLVM Compiler Framework
Daniele Cono D’Elia. Flexible On-Stack Replacement in LLVM
David Menendez. Termination-Checking for LLVM Peephole Optimizations
Eric Schkufza. STOCHASTIC PROGRAM OPTIMIZATION FOR x86 64 BINARIES
Federico Scrinzi. Behavioral Analysis of Obfuscated Code
Johan Fänge. A Tracing JIT Compiler for Erlang
Jozef Cel’uch. Java bytecode disassembler
Linhai Song. Understanding, Detecting, and Diagnosing Real-World Performance Bugs
Pooja Gupta. LLVM Backend Development for ReISC Architecture
Roel Jordans. High-level software-pipelining in LLVM
Simon Andreas Frimann Lund. A High Performance Backend for Array-Oriented Programming on Next-Generation Processing Units
Tilmann Scheller. Where is LLVM being used today

PE file & malware analysis

Alan Martin Sweeney. Malware Analysis & Antivirus Signature Creation
Blake Harrell Anderson. Integrating Multiple Data Views for Improved Malware Analysis
Christian Rossow. Using Malware Analysis to Evaluate Botnet Resilience
Christian Schönbein. PyBox - A Python Sandbox
Christopher B. Harrison. ODinn. An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
Christos Papadiotis. Enhancing AV-avoidance capabilities of a PE crypter
Dalbir Kaur R. Chhabra. Feature selection and clustering for malicious and benign software characterization
Dan Sinema. AUTOMATED REVERSE ENGINEERING OF MALWARE TO DEVELOP NETWORK SIGNATURES TO MATCH WITH KNOWN NETWORK SIGNATURES
Dimitrios A. Glynos. Packing Heat!
Fadel Omar Shaban. Spyware Detection Using Data Mining for Windows Portable Executable Files
Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas. NOA. AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM
Jani Hakkarainen. Malware Analysis Environment for Windows Targeted Malware
Jarno Niemela. Statistical Analysis Of Malware Defence Methods
Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES
Jiyong Jang. Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code
Jonathan Joseph Blount. Adaptive rule-based malware detection employing learning classifier systems
Katja Hahn. Robust Static Analysis of Portable Executable Malware
Lutz Bohne. Pandora’s Bochs. Automatic Unpacking of Malware
MICHAEL STEPHEN THIEMS. OPTIMIZATION AND EXECUTABLE REGENERATION IN THE IMPACT BINARY REOPTIMIZATION FRAMEWORK
Neel Bavishi. An Executable Packer
Nicholas S. Kovach. Accelerating Malware Detection via a Graphics Processing Unit
PAN-MING. Research on Detecting Mechanism for Trojan horse Based on PE file
Peter Ekstrand Berg. Behavior-based Classification of Botnet Malware
Raja M. Khurram Shahzad. Syed Imran Haider. Detection of Spyware by Mining Executable Files
Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann. Statistical Detection of Malicious PE-Executables Fast Offline Analysisfor
Shaked Bar. Kuluoz. Malware and botnet analysis
Soon Chai Liang. Understanding behavioural detection of antivirus
Steven Strandlund Hansen. Thor Mark Tampus Larsen. Dynamic Malware Analysis. Detection and Family Classification using Machine Learning
Sverker Nilsson. Heapy. A Memory Profiler and Debugger for Python
Vasileios Pappas. Defending against Return-Oriented Programming
Vishwath R. Mohan. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE
Yaser Alosefer. Analysing Web-based Malware Behaviour through Client Honeypots
Zhiqiang Lin. Reverse Engineering of Data Structures from Binary
Viacheslav78 вне форума   Ответить с цитированием
Старый 31.05.2017, 12:05   #47
Viacheslav78
Новичок
 
Аватар для Viacheslav78
 
Регистрация: 16.02.2016
Адрес: Россия
Сообщений: 6
Репутация: 24
По умолчанию

Offense & Defense

Ankita Kapratwar. Static and Dynamic Analysis for Android Malware Detection
Babar, Sachin D. Security Framework and Jamming Detection for Internet of Things
Chiem Trieu Phong. A Study of Penetration Testing Tools and Approaches
CRAIG LEONARD TIDWELL. TESTING THE IMPACT OF TRAINING WITH SIMULATED SCENARIOS FOR INFORMATION SECURITY AWARENESS ON VIRTUAL COMMUNITY OF PRACTICE MEMBERS
Daniel Lowry Lough. A TAXONOMY OF COMPUTER ATTACKS WITH APPLICATIONS TO WIRELESS NETWORKS
Eugene H. Spafford. Computer Viruses as Artificial Life
Fred Cohen. Computer Viruses
Gencer Erdogan. Security Testing of Web Based Applications
Jarmo Puttonen. Virtual learning environment for penetration testing
JOHN SHADRACH STAFFORD. BEHAVIOR-BASED WORM DETECTION
Joshua David Lind. Betting on the Bitcoin Blockchain
Le Wang. Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
Mahmood Nazari. Lokesh Galla. Denial of Service attack in IPv6 networks and counter measurements
MANUEL RODRIGUES CORREGEDOR. UTILIZING ROOTKITS TO ADDRESS THE VULNERABILITIES EXPLOITED BY MALWARE
Marco Ramilli. A Design Methodology for Computer Security Testing
Matteo Pomilia. A study on obfuscation techniques for Android malware
Matthias Rene Buchler. Semi-Automatic Security Testing of Web Applications with Fault Models and Properties
Miller, Bradley Austin. Scalable Platform for Malicious Content Detection Integrating Machine Learning and Manual Review
Nishant Shrestha. Security Assessment via Penetration Testing. A Network and System Administrator’s Approach
Pasquale Stirparo. MOBILEAK. SECURITY AND PRIVACY OF PERSONAL DATA IN MOBILE APPLICATIONS
Penetration Testing Guidance
Petter Svenhard & Amir Radaslic. A penetration test of an Internet service provider
Ravindar Reddy Ravula. CLASSIFICATION OF MALWARE USING REVERSE ENGINEERING AND DATAMINING TECHNIQUES
Ronny L. Bull. A Critical Analysis of Layer 2 Network Security in Virtualized Environments
Saied, Alan. Distributed Denial of Service (DDoS) attack detection and mitigation
Salman Javaid. Analysis and Detection of Heap-based Malwares Using Introspection in a Virtualized Environment
Sergio Pastrana Portillo. Attacks Against Intrusion Detection. Networks. Evasion, Reverse Engineering and Optimal Countermeasures
Susanne Vernersson. Penetration Testing in a Web Application Environment
Terry L. Nelms. IMPROVING DETECTION AND ANNOTATION OF MALWARE DOWNLOADS AND INFECTIONS THROUGH DEEP PACKET INSPECTION
THOMAS-QUENTIN MAILLART. MECHANISMS OF INTERNET EVOLUTION & CYBER RISK
Timothy D. Williams. The Value of Threat Models in Enterprise Security Testing of Database Systems & Services
Ulf Lindqvist. On the Fundamentals of Analysis and Detection of Computer Misuse
Vinod. Korrapati. Security Testing on Endpoint System
Vishwath R. Mohan. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE
Wesley Jin. Practical, Large-Scale Detection of Obfuscated Malware Code Via Flow Dependency Indexing
Viacheslav78 вне форума   Ответить с цитированием
Старый 31.05.2017, 12:06   #48
Viacheslav78
Новичок
 
Аватар для Viacheslav78
 
Регистрация: 16.02.2016
Адрес: Россия
Сообщений: 6
Репутация: 24
По умолчанию

Honeypot

Albert W. Brzeczko, Jr. SCALABLE FRAMEWORK FOR TURN-KEY HONEYNET DEPLOYMENT
Amit D. Lakhani. Deception Techniques Using Honeypots
Åsmund Nergård Nyre. Increasing Survivability by Dynamic Deployment of Honeypots
Bassam Alkudhir, Eleftherios Chairetakis & Panagiotis Mystridis. Deployment of Low Interaction Honeypots in University Campus Network
Benoit Jacob. Automatic XSS detection and Snort signatures-ACLs generation by the means of a cloud-based honeypot system
Bertrand Sobesto. EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR
Brandon Scott Miller. Analysis of Attacks on Web Based Applications
Brian M. Bowen. Design and Analysis of Decoy Systems for Computer Security
Christian Döring. Improving network security with Honeypots
Christian Seifert. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots
Corrado Leita, Marc Dacier. SGNET. a worldwide deployable framework to support the analysis of malware threat models
DARATZI PARASKEVI. ANALYSIS AND TESTING OF HONEYPOTS HONEYNET SYSTEMS
Davide BALZAROTTI. Plusieurs Axes d’Analyse de sites web compromis et malicieux
Erwin E. Frederick. TESTING A LOW-INTERACTION HONEYPOT AGAINST LIVE CYBER ATTACKERS
Georgios Portokalidis. Using Virtualisation to Protect Against Zero-Day Attacks
Gerard WAGENER. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour
Gurdip Kaur. Jatinder Singh Saini. Implementation of High Interaction Honeypot to Analyze the Network Traffic and Prevention of Attacks on Protocol-Port Basis
Honeypots. A Force Multiplier in Educational Domain
HONEYPOT SECURITY.pdf
Honeypots in Network Security.pdf
JAMES JOSEPH YUILL. DEFENSIVE COMPUTER-SECURITY DECEPTION OPERATIONS. PROCESSES, PRINCIPLES AND TECHNIQUES
Jan Gobel. Amun. A Python Honeypot Technical Report
Jarmo (J.M.) van Lenthe. Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy
John Børge Holen-Tjelta. Honeypots in network perimeter defense systems
JUNEWON PARK. Acquiring Digital Evidence from Botnet Attacks. Procedures and Methods
KAMALDEEP SEHGAL. Study on Web application Honey pots
Lucas Tamagna-Darr. Evaluating the effectiveness of an intrusion prevention - Honeypot hybrid
Mathias Gibbens. Harsha vardhan Rajendran. Honeypots
Michael Nørholt Petersen. Detecting network intrusions
Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS). Advanced Honeypot Architecture for Network Threats Quantification
Ng.Jun Ping. Enchancing Honeypot Stealthiness
Ondřej Koutský. Monitoring and Analysis of Cyber Attacks
Radhika Goel, Anjali Sardana, and R. C. Joshi. Wireless Honeypot. Framework, Architectures and Tools
Ratinder Kaur and Maninder Singh. A Hybrid Real-time Zero-day Attack Detection and Analysis System
Robin Berthier. Advanced Honeypot Architecture for Network Threats Quantification
Ronald Mitchell Campbell. The Legal and Ethical Issues of Deploying Honeypots
Saleh Ibrahim Bakr Almotairi. Using Honeypots to Analyse Anomalous Internet Activities
Sanjeev Kumar, Rakesh Sehgal, Paramdeep Singh. Nepenthes Honeypotsbased Botnet Detection
Simon Bell. Building a Honeypot to Research Cyber-Attack Techniques
Susan Marie Wade. SCADA Honeynets The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats
Vusal Aliyev. Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network
Yaser Alosefer. Analysing Web-based Malware Behaviour through Client Honeypots
Yogendra Kumar Jain. Honeypot based Secure Network System
YONG TANG. DEFENDING AGAINST INTERNET WORMS

Honeytrap

Abhishek Sharma. HONEYPOTS IN NETWORK SECURITY
Adam Schoeman. Amber. A Zero-Interaction Honeypot with Distributed Intelligence
Aditya K Sood. Rohit Bansal. Reverse Honey Trap. Striking Deep inside Online Web Antivirus Engines and Analyzers
Alec Yasinsac. Yanet Manzano. Honeytraps, A Network Forensic Tool
Andreas Pitsillidis. Spam Value Chain. Defensive Intervention Analysis
Ashwini Gabhane. Honey Trap Security Server. An Efficient Approach of Securing E-Banking Network
Chih-Hung Lin and Chung-Huang Yang. IMPLEMENTATION OF NETWORK FORENSICS BASED ON HONEYPOT
Daisuke Miyamoto. INTERCEPT. High-interaction Server-type Honeypot based on Live Migration
David J. Malan. Rapid Detection of Botnets through Collaborative Networks of Peers
DAVID MALANIK, LUKAS KOURIL. Honeypot as the Intruder Detection System
David Watson. Jamie Riden. The Honeynet Project. Data Collection Tools, Infrastructure, Archives and Analysis
Émerson Salvadori Virti. Honeypots as a Security Mechanism
Feng Zhang. Honeypot. А Supplemented Active Defense System for Network Security
Hrishikesh Arun Deshpande. HoneyMesh. Preventing Distributed Denial of Service Attacks using Virtualized Honeypots
Hu Jingfang. Li Busheng. The Application Research on Network Forensics
John E. Clark, Christopher P. Lee, Roshan Menon, Vanessa Rood. HoneyTrap Visualization for Monitoring Honeynets
JOHN SHADRACH STAFFORD. BEHAVIOR-BASED WORM DETECTION
Lai-Ming Shiue. Shang-Juh Kao. Countermeasure for Detection of Honeypot Deployment
M. Dornseif, F.C. Gärtner, and T. Holz. Vulnerability Assessment using Honepots
Matthijs Koot. Intrusion Detection Systems
Michael Eugene Sanders. Unknown Threat Detection With Honeypot Ensemble Analsyis Using Big Datasecurity Architecture
Mitsuaki Akiyama. Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection
Nathalie Weiler. Honeypots for Distributed Denial of Service Attacks
NIHARIKA. RANJEET KAUR. HONEYPOTS FOR NETWORK SURVEILLANCE
Sebastian Poeplau. Jan Gassen. A Honeypot for Arbitrary Malware on USB Storage Devices
Web Based Security - Using Honeypots.pdf
Yousef T. Aburabie & Mohmed Omar Yousef T. Aburabie & Mohmed Omari. Network Forensics Tool “Honeytrap Project Honeytrap Project
Virustraps, Spamtrap
10 Basics to Avoid Being Categorized as Spam.pdf
A Practitioner's Guide to Spam Traps.pdf
Cristian Lumezanu. Nick Feamster. Observing Common Spam in Tweets and Email.pdf
Demystifying the Anti-Spam Buzz.pdf
In Spam Blocklists and Volume.pdf
Jaeyeon Jung. An Empirical Study of Spam Traffic and the Use of DNS Black Lists.pdf
McBoost. Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.pdf
MDaemon configuration recommendations for dealing with spam related issues.pdf
Messaging, Malware and Mobile Anti-Abuse Working Group.pdf
Mind Your Blocks.pdf
Numaan Huq & Peter Szabo. TRAPPING UNKNOWN MALWARE IN A CONTEXT WEB
Oliver Hohlfeld. Longtime Behavior of Harvesting Spam Bots
Peter Haider. Bayesian Clustering for Email Campaign Detection
Spam, Real World Numbers and the Value of IP Reputation Lists.pdf
SPAM TRAPS AND HONEY POTS. DEFINITION, PREVENTION, AND ELIMINATION.pdf
The Ultimate Guide to Email Deliverablility.pdf
Trap_a_Bot_for_Fun_and_Profit_-_Attila_Marosi
Viruses Trojans and Spam.pdf
warning-signs-that-your-client-is-spamming.pdf
What-You-Need-to-Know-about-Spam-Traps.pdf
Viacheslav78 вне форума   Ответить с цитированием
Старый 28.06.2017, 15:21   #49
chinaec
Новичок
 
Аватар для chinaec
 
Регистрация: 28.06.2017
Адрес: ул. Квантунская 12
Сообщений: 2
Репутация: 21

icq: 556435656
skype: chiospa
По умолчанию

Цитата:
Сообщение от rpy3uH Посмотреть сообщение
Очень хороший сайт с оригинальными статьями про работу с COM, LPT, USB
http://www.pcports.ru/
Рекомендую!
Там про USB порты ни чего нет(
__________________
пишу на древнем языке ПЛ-1
chinaec вне форума   Ответить с цитированием
Старый 28.06.2017, 17:19   #50
zvygin1964
Троль, флудёр
Профессионал
 
Аватар для zvygin1964
 
Регистрация: 19.06.2013
Адрес: Потресово Калужской_области Репутация: 10
Сообщений: 1,751
Репутация: 1274
По умолчанию

Цитата:
Сообщение от chinaec Посмотреть сообщение
Там про USB
http://www.kernelchip.ru/pcports/PS010.php
__________________
Не программист вообще.
zvygin1964 вне форума   Ответить с цитированием
Ответ



Опции темы

Ваши права в разделе
Вы не можете создавать новые темы
Вы не можете отвечать в темах
Вы не можете прикреплять вложения
Вы не можете редактировать свои сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.

Быстрый переход

Похожие темы
Тема Автор Раздел Ответов Последнее сообщение
Что читать? BlackMamba SQL, базы данных 2 23.07.2008 00:48
Научите меня читать API Humus Общие вопросы по Java, Java SE, Kotlin 0 12.02.2008 01:58
Как читать удалённые файлы? Никки Работа с сетью в Delphi 3 16.01.2008 23:38
Как читать атрибуты с файлов? eks-s Общие вопросы Delphi 2 16.01.2008 03:25




15:37.


Powered by vBulletin® Version 3.8.8 Beta 2
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.

купить трафик


как улучшить посещаемость, а также решения по монетизации сайтов, видео и приложений

RusProfile.ru


Справочник российских юридических лиц и организаций.
Проекты отопления, пеллетные котлы, бойлеры, радиаторы
интернет магазин respective.ru