Click here to Skip to main content
Click here to Skip to main content
Articles » Web Development » Web Security » General » Alternatives
 
Alternatives

Tagged as

Stuxnet Malware Analysis Paper

, 9 Sep 2011
This article will focus on Stuxnet’s windows infection methods and spreading methods. The tricks were used by stuxnet and the evidences behind the criminals of stuxnet.

Alternatives

Members may post updates or alternatives to this current article in order to show different approaches or add new features.

No alternatives have been posted.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

AmrThabet
Software Developer (Senior) Q-CERT
Egypt Egypt
Amr Thabet (@Amr_Thabet) is a Malware Researcher at Q-CERT with 5+ years experience in reversing malware, researching and programming. He is the Author of many open-source tools like Pokas Emulator and Security Research and Development Framework (SRDF).
Follow on   Twitter

| | Privacy | Mobile
Web01 | 2.8.140827.1 | Last Updated 9 Sep 2011
Article Copyright 2011 by AmrThabet
Everything else Copyright © CodeProject, 1999-2014
Terms of Service
Layout: fixed | fluid