Scientific but Not Academical Overview of Malware Anti-Debugging, Anti- Disassembly and Anti-VM, 2012. ,
A Study on Advanced Persistent Threats, Proceedings of the 15th IFIP TC6/TC11 Conference on Communications and Multimedia Security, 2014. ,
DOI : 10.1007/978-3-662-44885-4_5
URL : https://hal.archives-ouvertes.fr/hal-01404186
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, IEEE International Conference on Dependable Systems and Networks, pp.177-186, 2008. ,
The Ultimate Anti-Debugging Reference, 2011. ,
Using large scale distributed computing to unveil advanced persistent threats, SCIENCE, vol.1, issue.3, p.2013 ,
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Proceedings of the 6th International Conference on Information Warfare and Security, 2013. ,
The Icefog APT: A Tale of Cloak and Three Daggers, 2013. ,
Energetic Bear -Crouching Yeti, 2014. ,
A look at targeted attacks through the lense of an ngo, Proceedings of the 23rd USENIX conference on Security Symposium, pp.543-558, 2014. ,
APT1: Exposing One of China's Cyber Espionage Unit, 2013. ,
Anti-Virus Evasion Techniques Virus Evasion Techniques Virus Evasion Techniques and Countermeasures ,
Virtual Machines Detection Enhanced, 2013. ,
Hot Knives Through Butter: Evading File-based Sandboxes, 2014. ,
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat, Proceedings of the 15th Symposium on Research in Attacks, Intrusions, and Defenses, pp.64-85, 2012. ,
DOI : 10.1007/978-3-642-33338-5_4
Operation Ke3chang: Targeted Attacks Against Ministries of Foreign Affairs, 2013. ,