Symbian malware uses a 91-byte XOR key, Fortinet, Sunnyvale, California (blog.fortinet.com/symbian-malware-us es-a-91-byte-xor-key, p.2012 ,
Frank Boldewin's www.reconstructer.org (www. reconstructer.org/code, 2009. ,
The Trojan horse defense in cybercrime cases, pp.1-53, 2004. ,
The Sleuth Kit (www.sleuthkit.org/sleuthkit), 2013. ,
Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004. ,
DOI : 10.1145/1013886.1007518
URL : http://cecs.wright.edu/cop/cybw/Christodorescu_Mihai_.pdf
Video coding for streaming media delivery on the Internet, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.3, pp.269-281, 2001. ,
DOI : 10.1109/76.911155
Malware obfuscated within PNG files, Columbia, Maryland (www.cyberengineeringservices.com/mal ware-obfuscated-within-png-files), 2011. ,
Malware obfuscated within PNG files > Sample 2, Columbia, Maryland (www.cyberengineeringserv ices.com/malware-obfuscated-within-png-files, 2011. ,
Hexplorer (sourceforge, p.2013 ,
NoMoreXOR (github.com/hiddenillusion, NoMore XOR), 2013. ,
XORBruteForcer (eternal-todo.com, 2008. ,
Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009. ,
DOI : 10.1016/j.diin.2009.06.016
Digital media triage with bulk data analysis and bulk_extractor, Computers & Security, vol.32, pp.56-72, 2013. ,
DOI : 10.1016/j.cose.2012.09.011
Safe Browsing API, Mountain View, California (develop ers.google.com/safe-browsing, p.2013 ,
iheartxor (hooked-on-mnemonics.blogspot, p.2012 ,
Decoding data exfiltration ? Reversing XOR encryption , Crucial Security Forensics Blog (crucialsecurityblog. harris.com/2011/07/06/decoding-data-exfiltration-%E2%80 %93-reversing-xor-encryption), 2011. ,
Bypassing anti-virus scanners (dl. packetstormsecurity.net, 2011. ,
Towards complete node enumeration in a peer-to-peer botnet, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.23-34, 2009. ,
DOI : 10.1145/1533057.1533064
New malware document scanner tool released, North Grenville, Canada (blog.malwaretracker.com/2012/02/ new-malware-document-scanner-tool, p.2012 ,
XOR entire file or selected text, ForensicKB (www.for ensickb.com/2008/03/xor-entire-file-or-selected-text, 2008. ,
XORSearch and XORStrings (blog.didierstevens. com/programs/xorsearch), 2007. ,
Translate (blog.didierstevens.com/programs/trans late), 2008. ,
New tool: XORStrings (blog.didierstevens.com/?s= xorstrings), 2013. ,
View Nero Premium Details (www.check filename, p.2013 ,
Cryptography and steganography, Internal Journal of Computer Applications, vol.1, issue.12, pp.61-65, 2010. ,
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?, 2013 International Conference on Availability, Reliability and Security, pp.248-254, 2013. ,
DOI : 10.1109/ARES.2013.32