From ac1f744096910b31362360272fea0512eaaa3d08 Mon Sep 17 00:00:00 2001 From: reubenajohnston Date: Fri, 19 Jan 2024 23:08:45 -0500 Subject: [PATCH] Update curated_list_of_infamous_malware_reuben_johnston.tex --- curated_list_of_infamous_malware_reuben_johnston.tex | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/curated_list_of_infamous_malware_reuben_johnston.tex b/curated_list_of_infamous_malware_reuben_johnston.tex index 94e6ea6..8bdcabc 100644 --- a/curated_list_of_infamous_malware_reuben_johnston.tex +++ b/curated_list_of_infamous_malware_reuben_johnston.tex @@ -48,7 +48,7 @@ \noindent\textbf{Code Red Worm (2001):} \begin{easylist}[itemize] & \href{https://doi.org/10.1145/501317.501328}{The Code Red Worm, by Hal Berghel, Communications of the ACM, Vol. 44, No. 12, Dec. 2001} - & The Code Red Worm (v1.2e), by John C. Dolak, Security Essentials + & \href{https://www.sans.org/white-papers/85/}{The Code Red Worm (v1.2e), by John C. Dolak, Security Essentials} \end{easylist} \noindent\textbf{Slammer Worm (2003):} @@ -70,18 +70,20 @@ \noindent\textbf{Darkhotel Cyberspy Campaign (2007):} \begin{easylist}[itemize] - & \href{https://www.kaspersky.com/blog/darkhotel-apt/6613}{} + & \href{https://www.kaspersky.com/blog/darkhotel-apt/6613}{Darkhotel: a spy campaign in luxury Asian hotels, by Alex Drozhzhin, Kaspersky Daily, November 10, 2014} \end{easylist} \noindent\textbf{Conficker Worm (2008):} \begin{easylist}[itemize] - & \href{}{} + & \href{https://doi.ieeecomputersociety.org/10.1109/MC.2009.198}{On the Trail of the Conficker Worm, George Lawton, IEEE Computer, Vol. 42, June 2009} \end{easylist} \noindent\textbf{Stuxnet Attack (2010):} \begin{easylist}[itemize] - & \href{https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet}{} - & \href{https://www.kaspersky.com/blog/stuxnet-victims-zero/6775}{} + & \href{https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet}{An Unprecedented Look at Stuxnet, the World's First Digital Weapon, Kim Zetter, Wired, November 3, 2014} + & \href{https://www.kaspersky.com/blog/stuxnet-victims-zero/6775}{Stuxnet: Victims Zero, Marvin the Robot, Kaspersky Daily, November 18, 2014} + & \href{https://web.archive.org/web/20180608052155/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf}{W32.Stuxnet Dossier, Falliere et al., Symantec Security Response, February 2011} + & \href{https://doi.org/10.1109/MSPEC.2013.6471059}{The Real Story of Stuxnet, David Kushner, IEEE Spectrum, Vol. 50, No. 3, March 2013} \end{easylist} \noindent\textbf{Cryptolocker Ransomware (2013):}