| 2012-12-01 | Scoring PDF Structure To Detect Malicious Files | 路人甲 | 3031 | |
| 2012-12-01 | An Analysis of a Fake Vodafone Bill PDF File | 路人甲 | 2799 | |
| 2012-12-01 | Malware analysis as a hobby | 路人甲 | 2472 | |
| 2012-11-30 | Crisis: The Advanced Malware | 路人甲 | 3267 | |
| 2012-11-30 | Spear-Phishing Email: Most Favored APT Attack Bait | 路人甲 | 3264 | |
| 2012-11-29 | HTTP iframe Injecting Linux Rootkit | 路人甲 | 3897 | |
| 2012-11-23 | The Future of Automated Malware Generation | 路人甲 | 2808 | |
| 2012-11-23 | Win32/Flamer: Reverse Engineering and Framework Reconstruction | 路人甲 | 3009 | |
| 2012-11-22 | Automated Malware Analysis & Deobfuscation | 路人甲 | 2685 | |
| 2012-11-21 | Gong Da / Gondad Exploit Pack Add Java CVE-2012-5076 support | 路人甲 | 2211 | |
| 2012-11-14 | 趋势:第三季度网络安全威胁报告 | 路人甲 | 2562 | |
| 2012-11-13 | Georbot Botnet – A cyber espionage campaign against Georgian Government | 路人甲 | 3793 | |
| 2012-11-13 | Information-based Dependency Matching For Behavioral Malware Analysis | 路人甲 | 2681 | |