1.2015年移动恶意软件的演变
https://securelist.com/analysis/kaspersky-security-bulletin/73839/mobile-malware-evolution-2015/
2.通过低带宽电磁攻击在个人PC上提取ECDH密钥
https://eprint.iacr.org/2016/129.pdf
3.sonar:一款GO语言开发的在渗透前期列举子域名的工具
https://github.com/jrozner/sonar
4.以彼之道还施彼身,使用EMET来禁止EMET
https://www.fireeye.com/blog/threat-research/2016/02/using_emet_to_disabl.html
5.对alexa排名前100万的站点的HTTP头中的Access-Control-Allow-Origin进行调研
6.CVE-2015-8277:对Flexera’s FlexNet Publisher (License Manager) 的分析
https://www.securifera.com/advisories/cve-2015-8277/
7.对赛门铁克 Endpoint Protection产品的渗透:传统版
http://codewhitesec.blogspot.tw/2016/02/symantec-endpoint-protection-legacy-edition.html
8.实践TEMPEST攻击
https://www.schneier.com/blog/archives/2016/02/practical_tempe.html
9.block-parser:解析windows powershell脚本块日志事件的工具
https://github.com/matthewdunwoody/block-parser
10.分析powerpoint的custom action(替代宏来执行恶意payload)
http://phishme.com/powerpoint-and-custom-actions/
11.NextKey:ubuntu上的键盘记录
https://github.com/misteriouser/NextKey
12.Necurs.P2P:一种新型的点对点僵尸网络
http://www.malwaretech.com/2016/02/necursp2p-hybrid-peer-to-peer-necurs.htm