A. Apvrille, Symbian malware uses a 91-byte XOR key, Fortinet, Sunnyvale, California (blog.fortinet.com/symbian-malware-us es-a-91-byte-xor-key, p.2012

F. Boldewin, Frank Boldewin's www.reconstructer.org (www. reconstructer.org/code, 2009.

S. Brenner, B. Carrier, and J. Henninger, The Trojan horse defense in cybercrime cases, pp.1-53, 2004.

B. Carrier, The Sleuth Kit (www.sleuthkit.org/sleuthkit), 2013.

M. Christodorescu and S. Jha, Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004.
DOI : 10.1145/1013886.1007518

URL : http://cecs.wright.edu/cop/cybw/Christodorescu_Mihai_.pdf

G. Conklin, G. Greenbaum, K. Lillevold, A. Lippman, and Y. Reznik, Video coding for streaming media delivery on the Internet, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.3, pp.269-281, 2001.
DOI : 10.1109/76.911155

. Cyber-engineering and . Services, Malware obfuscated within PNG files, Columbia, Maryland (www.cyberengineeringservices.com/mal ware-obfuscated-within-png-files), 2011.

. Cyber-engineering and . Services, Malware obfuscated within PNG files > Sample 2, Columbia, Maryland (www.cyberengineeringserv ices.com/malware-obfuscated-within-png-files, 2011.

M. Dudek, Hexplorer (sourceforge, p.2013

G. Edwards, NoMoreXOR (github.com/hiddenillusion, NoMore XOR), 2013.

J. Esparza, XORBruteForcer (eternal-todo.com, 2008.

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009.
DOI : 10.1016/j.diin.2009.06.016

S. Garfinkel, Digital media triage with bulk data analysis and bulk_extractor, Computers & Security, vol.32, pp.56-72, 2013.
DOI : 10.1016/j.cose.2012.09.011

. Google, Safe Browsing API, Mountain View, California (develop ers.google.com/safe-browsing, p.2013

A. Hanel, iheartxor (hooked-on-mnemonics.blogspot, p.2012

B. Hussey, Decoding data exfiltration ? Reversing XOR encryption , Crucial Security Forensics Blog (crucialsecurityblog. harris.com/2011/07/06/decoding-data-exfiltration-%E2%80 %93-reversing-xor-encryption), 2011.

I. Security and T. , Bypassing anti-virus scanners (dl. packetstormsecurity.net, 2011.

B. Kang, E. Chan-tin, C. Lee, J. Tyra, H. Kang et al., Towards complete node enumeration in a peer-to-peer botnet, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.23-34, 2009.
DOI : 10.1145/1533057.1533064

M. Tracker, New malware document scanner tool released, North Grenville, Canada (blog.malwaretracker.com/2012/02/ new-malware-document-scanner-tool, p.2012

L. Mueller, XOR entire file or selected text, ForensicKB (www.for ensickb.com/2008/03/xor-entire-file-or-selected-text, 2008.

D. Stevens, XORSearch and XORStrings (blog.didierstevens. com/programs/xorsearch), 2007.

D. Stevens, Translate (blog.didierstevens.com/programs/trans late), 2008.

D. Stevens, New tool: XORStrings (blog.didierstevens.com/?s= xorstrings), 2013.

S. Checkfilename, View Nero Premium Details (www.check filename, p.2013

I. Venkata-sai and . Manoj, Cryptography and steganography, Internal Journal of Computer Applications, vol.1, issue.12, pp.61-65, 2010.

N. Virvilis and D. Gritzalis, The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?, 2013 International Conference on Availability, Reliability and Security, pp.248-254, 2013.
DOI : 10.1109/ARES.2013.32