|
[1] Wikipedia. Office open xml http://en.wikipedia.org/wiki/office_open_xml. 2014. [2] Wikipedia. Advanced persistent threat http:// en.wikipedia.org/ wiki/ advanced_ persistent_threat. [3] Mandiant. ”apt1: Exposing one of china’s cyber espionage units”. 2013. [4] Advanced persistent threats and other advanced attacks: Threat analysis and defense strategies for smb, mid-size, and enterprise organizations. [5] WIRED. Google hack attack was ultra sophisticated, new details show. 2010. [6] PcWorld. ”rsa securid hack shows danger of apts”. 2011. [7] Office open xml file formates - foundamentals and markup language reference. [8] Wikipedia. Common vulnerabilities and exposures http://en.wikipedia.org/ wiki/common_vulnerabilities_and_exposures. [9] Cve http://cve.mitre.org/index.html. [10] Cve 2013-3906 http:// web.nvd.nist.gov/ view/ vuln/ detail? vulnid=cve-2013- 3906. [11] Virustotal https://www.virustotal.com/. [12] Proofpoint. http://www.proofpoint.com/threatinsight/posts/dissecting-docximage- exploit-kit-cve-exploitation.php. [13] Xecure lab http://www.xecure-lab.com/zhtw/index.html. [14] The malware archives: Ms office files http://blog.malwarebytes.org/intelligence/ 2013/08/ms-office-files/. [15] Offvis http://download.techworld.com/3214034/microsoft-offvis-11/. [16] Jpexs free flash decompiler http://www.free-decompiler.com/flash/. [17] Jing-Yao Lin and Hsing-Kuo Pao. Multi-view malicious document detection. In Conference on Technologies and Applications of Artificial Intelligence, 2013. [18] Adam Barth, Joel Weinberger, and Dawn Song. Cross-origin javascript capability leaks: Detection, exploitation, and defense. In 18th USENIX Security Symposium, 2009. [19] Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, and Dong Xuan. Malicious shellcode detection with virtual memory snapshots. In INFOCOM, 2010 Proceedings IEEE, 2010. [20] Peter Likarish, Eunjin (EJ) Jung, and Insoon Jo. Obfuscated malicious javascript detection using classification techniques. In 4th Inter. Conf, 2009. [21] Pavel Laskov and Nedim Šrndic. Static detection of malicious javascript-bearing pdf documents. In 27th Annual Computer Security Applications Conference, 2011. [22] Zacharias Tzermias, Giorgos Sykiotakisand Michalis Polychronakis, and Evangelos P. Markatos. Combining static and dynamic analysis for the detection of malicious documents. In Fourth European Workshop on System Security, 2011. [23] David Maiorca, Giorgio Giacinto, and Igino Gorona. A pattern recognition system for malicious pdf files detection. In Machine Learning and Data Mining in Pattern Recognition, 2012. [24] Frank Boldewin. http://www.reconstructer.org/code.html. [25] Pe_carver https://github.com/rurik/pe_carver/blob/master/pe_carve.py. [26] Beautiful soup http://www.crummy.com/software/beautifulsoup/. [27] Wikipedia. Xml http://en.wikipedia.org/wiki/xml. [28] Officemalhunter https://github.com/binjo/utils. |