Click here to Skip to main content
11,721,289 members (87,540 online)
Click here to Skip to main content
Add your own
alternative version

Tagged as

Stuxnet Malware Analysis Paper

, 9 Sep 2011 CPOL 79K 4K 77
This article will focus on Stuxnet’s windows infection methods and spreading methods. The tricks were used by stuxnet and the evidences behind the criminals of stuxnet.

Views

Downloads

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

AmrThabet
Software Developer (Senior) Q-CERT
Egypt Egypt
Amr Thabet (@Amr_Thabet) is a Malware Researcher at Q-CERT with 5+ years experience in reversing malware, researching and programming. He is the Author of many open-source tools like Pokas Emulator and Security Research and Development Framework (SRDF).

You may also be interested in...

| Advertise | Privacy | Terms of Use | Mobile
Web04 | 2.8.150901.1 | Last Updated 9 Sep 2011
Article Copyright 2011 by AmrThabet
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid