Blog
About
Publications
Vegan
Megabeets
Blog
About
Publications
Vegan
Menu
Conference Paper & Research Publication
2020
Graphology of an Exploit - Hunting for exploits by looking for the author's fingerprints
.
Conference Paper
Virus Bulletin
(2020-10-01)
Research Publication
Check Point Research
(2020-10-02)
Virus Bulletin PDF
Read on Check Point Research
Virus Bulletin 2020 Conference Paper
Conference Presentations
This research was presented at 3 conferences.
Virus Bulletin 2020
Online (Covid-19)
Watch Video
AVAR 2020
Online (Covid-19)
Abstract
SECURE 2020
Online (Covid-19)
Watch Video
Citations & Coverage
Government & Policy
cert.pl (PDF)
cert.pl
mentioned
Academic
Identifying Authorship Style In Malicious Binaries: Techniques, Challenges & Datasets
University of London, Academic Paper
cited
referenced
author
Deep malware analysis for collecting intelligence of cyber attackers
Shizuoka University, Japan
cited
VAPT & Exploits, along with Classification of Exploits
Sage University Bhopal, M.P, India
cited
Media Coverage
Researchers Fingerprint Exploit Developers Who Help Several Malware Authors
The Hacker News
interviewed
quoted
author
Check Point fingerprints and tracks malware developers' work
IT-Online
2005-20-10
interviewed
mentioned
Check Point fingerprints and tracks malware developers’ work
N3X0
2002-20-10
author
Exploits authors and Windows LPE vulnerabilities
CybersecAsia
author
Graphology of an Exploit – Hunting for exploits by looking for the author's fingerprints
Virus Bulletin VB2020
presenter
author
Graphology of an Exploit – Hunting for exploits by looking for the author's fingerprints
AVAR 2020
presenter
author
Security Team Creates "Fingerprint" Method to Track Microsoft Windows Threat Authors
WinBuzzer
2002-20-10
author
The Journey Of Hunting ITW Windows LPE 0day
Black Hat USA 2022
cited
youtube.com
youtube.com
Researchers use 'fingerprints' tech to spot Russian hackers | Economic Times CISO
ciso.economictimes.indiatimes.com
Researchers use 'fingerprints' to track Windows exploit developers
Cyber Security Review
Researchers Use 'Fingerprints' To Track Windows Exploit Developers
Privacy Ninja
Researchers use new technique to track Windows exploit developers
Cybersafe News
Volodya/BuggiCorp Windows exploit developer: What you need to know
Infosec Institute