1. Bayer, U.: Anubis - analyzing unknown binaries,
http://www.anubis.iseclab.org
2. Capture-HPC Client Honeypot / Honeyclient (2009),
https://projects.honeynet.org/capture-hpc
3. Chenette, S.: ToorConX - the ultimate deobfuscator (2008),
http://www.toorcon.org/tcx/26_Chenette.pdf
4. Superbuddy activex control vulnerability (2006),
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5820
5. Dagon, D., Gu, G., Lee, C., Lee, W.: A Taxonomy of Botnet Structures. In: Annual Computer Security Applications Conference, ACSAC (2007)