Click here to Skip to main content
Click here to Skip to main content
 
Add your own
alternative version

Tagged as

Stuxnet Malware Analysis Paper

, 9 Sep 2011
This article will focus on Stuxnet’s windows infection methods and spreading methods. The tricks were used by stuxnet and the evidences behind the criminals of stuxnet.

Statistics


License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

AmrThabet
Software Developer (Senior) Q-CERT
Egypt Egypt
Amr Thabet (@Amr_Thabet) is a Malware Researcher at Q-CERT with 5+ years experience in reversing malware, researching and programming. He is the Author of many open-source tools like Pokas Emulator and Security Research and Development Framework (SRDF).
Follow on   Twitter

| Advertise | Privacy | Mobile
Web02 | 2.8.140814.1 | Last Updated 9 Sep 2011
Article Copyright 2011 by AmrThabet
Everything else Copyright © CodeProject, 1999-2014
Terms of Service
Layout: fixed | fluid