| 2012-12-01 | Scoring PDF Structure To Detect Malicious Files | 路人甲 | 3002 | |
| 2012-12-01 | An Analysis of a Fake Vodafone Bill PDF File | 路人甲 | 2798 | |
| 2012-12-01 | Malware analysis as a hobby | 路人甲 | 2468 | |
| 2012-11-30 | Crisis: The Advanced Malware | 路人甲 | 3249 | |
| 2012-11-30 | Spear-Phishing Email: Most Favored APT Attack Bait | 路人甲 | 3215 | |
| 2012-11-29 | HTTP iframe Injecting Linux Rootkit | 路人甲 | 3840 | |
| 2012-11-23 | The Future of Automated Malware Generation | 路人甲 | 2774 | |
| 2012-11-23 | Win32/Flamer: Reverse Engineering and Framework Reconstruction | 路人甲 | 2975 | |
| 2012-11-22 | Automated Malware Analysis & Deobfuscation | 路人甲 | 2679 | |
| 2012-11-21 | Gong Da / Gondad Exploit Pack Add Java CVE-2012-5076 support | 路人甲 | 2205 | |
| 2012-11-14 | 趋势:第三季度网络安全威胁报告 | 路人甲 | 2554 | |
| 2012-11-13 | Georbot Botnet – A cyber espionage campaign against Georgian Government | 路人甲 | 3738 | |
| 2012-11-13 | Information-based Dependency Matching For Behavioral Malware Analysis | 路人甲 | 2658 | |