Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.
a0add4653a5c75e92a5147130c2b9d8fa675a786b51bb7b700de2c8af48867f3
Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.
75e6d217f9ac0859aa9d4ad1ececb2d395e122d6a0d1fa7cb30fc9e81bc01da9
Whitepaper called How Conficker makes use of MS08-067.
c85e38425c879865b44dab94c6cdc62028015e130f3558fc226371b1a7cead19
Whitepaper called Using "ShoutBoxes" to control malicious software.
91a1817d06be8df94c362006adb3692753968eda65e7b1c2b874192986c6fb0e
Whitepaper written to address both FUD and rumors surrounding the release of detailed information about the InqTana proof of concept worm.
97f38cd5ac3a5a8e7f37fced12c45e663ce5ca7f24ea52a2d3c528ce2ed49f19
Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.
d88a99b49aac9da3d26fb558eb119b553a9571fe97443460ff28b76b9d69d758
White-paper from Imperva's Application Defense Center discussing the possibility of automated, self-propagating attacks on custom web application code. It shows that such attacks are not only feasible but that their theoretical success rate is far great than worms targeting commercial infrastructure.
749f77d25ab5aed09537e587454e97afc0fb0f15bc5ef11504827972d2ef0d98