1. [1] S. L. Blond, A. Uritesc, C. Gilbert, Z. L. Chua, P. Saxena, and E. Kirda, “A Look at Targeted Attacks Through the Lense of an NGO,” in 23rd USENIX Security Symposium (USENIX Security 14), Aug. 2014.
2. [2] W. R. Marczak, J. Scott-Railton, M. Marquis-Boire, and V. Paxson, “When Governments Hack Opponents: A Look at Actors and Technology,” in 23rd USENIX Security Symposium (USENIX Security 14), Aug. 2014.
3. [3] S. Hardy, M. Crete-Nishihata, K. Kleemola, A. Senft, B. Sonne, G. Wiseman, P. Gill, and R. J. Deibert, “Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware,” in 23rd USENIX Security Symposium (USENIX Security 14), Aug. 2014.
4. [4] “FinFisher - Excellence in IT Investigation,” accessed: 27-February-2014. [Online]. Available: http://www.finfisher.com/
5. [5] “Hacking Team,” accessed: 27-February-2014. [Online]. Available: http://www.hackingteam.it/