-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
87 lines (77 loc) · 3.53 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
@conference{forensic_friday_execs,
title = {What is an executable?},
booktitle = {Forensic Friday Gyala S.r.l. 21-04-2023},
year = {2023},
author = {Andrea Pedini}
}
@misc{malwarebytes_malware_definition,
author = {MalwareBytes},
title = {Cos'è un malware?},
year = {2018},
url = {https://web.archive.org/web/20230429224023/https://it.malwarebytes.com/malware/},
urldate = {2023-04-29}
}
@techreport{Souppaya2013,
doi = {10.6028/nist.sp.800-83r1},
url = {https://doi.org/10.6028/nist.sp.800-83r1},
year = {2013},
institution = {U.S. Department of Commerce},
month = jul,
publisher = {National Institute of Standards and Technology},
author = {Murugiah Souppaya and Karen Scarfone},
title = {Guide to Malware Incident Prevention and Handling for Desktops and Laptops}
}
@misc{mitre_attack_framework_introduction,
author = {Blake Strom},
title = {ATT\&CK 101},
year = {2018},
url = {https://web.archive.org/web/20220301232425/https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/attck-101}
}
@misc{crowdstrike_malware_types,
author = {Kurt Bake},
title = {The 12 most common types of malware},
year = {2023},
url = {https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/}
}
@misc{threat_intelligence_kaspersky,
author = {AO Kaspersky Lab.},
title = {Cos'è la threat intelligence? Definizione e spiegazione},
url= {https://www.kaspersky.it/resource-center/definitions/threat-intelligence},
}
@misc{cyber_kill_chain_360,
author = {Lorenzo Gizzi},
year = {2019},
title = {Cyber Kill Chain, ecco come identificare un attacco informatico e adottare le giuste contromisure},
url = {https://tinyurl.com/3mzfs7ne},
}
@misc{elf_anatomy,
author = {Matt Oswalt},
title = {Anatomy of a Binary Executable},
url = {https://oswalt.dev/2020/11/anatomy-of-a-binary-executable/}
}
@article{capa_mandiant_blogpost,
author = {Willi Ballenthin AND Moritz Raabe},
title = {capa: Automatically Identify Malware Capabilities},
journal = {Mandiant Threat Research},
year = {2020},
note = "\url{https://www.mandiant.com/resources/blog/capa-automatically-identify-malware-capabilities}"
}
@misc{hunt_sleeping_techniques,
author = {thefLink},
title = {Hunt Sleeping Beacons Techniques},
url = {https://github.com/thefLink/Hunt-Sleeping-Beacons}
}
@misc{rfc4949,
series = {Request for Comments},
number = 4949,
howpublished = {RFC 4949},
publisher = {RFC Editor},
doi = {10.17487/RFC4949},
url = {https://www.rfc-editor.org/info/rfc4949},
author = {Robert W. Shirey},
title = {{Internet Security Glossary, Version 2}},
pagetotal = 365,
year = 2007,
month = aug,
abstract = {This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.},
}