11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

have put advanced tools in <strong>the</strong> hands <strong>of</strong> malware analysts at government operation centers, shortening<br />

<strong>the</strong>ir response times, and have also provided specialized analytical support to federal agencies.<br />

It fosters research with <strong>the</strong> Artifact Catalog and serves as a neutral third party for collecting,<br />

categorizing, and analyzing malware.<br />

The <strong>SEI</strong> has reached out to <strong>the</strong> community, bringing disparate groups toge<strong>the</strong>r to collaborate on<br />

identifying significant issues and sharing tools and techniques. The Malicious Code Workshops<br />

give experts a forum for sharing information and techniques and also help build a community.<br />

The <strong>SEI</strong> malware experts have reached more than 1,100 people through <strong>the</strong> Malicious Code<br />

Workshops and have reached even more through pr<strong>of</strong>essional conferences, meetings with individual<br />

government agencies/departments, and email.<br />

References<br />

[Bair 1999] Bair, Jeffrey, Associated Press. “Virus Fighters Eye How, Not Who.” The Indiana<br />

Gazette, (April 9, 1999): 9. Archived at http://www.newspaperarchive.com/SiteMap/FreePdfPreview.aspx?img=112050250<br />

[Brewin 1999] Brewin, Bob & Verton, Daniel. “Melissa Tests DoD Procedures.” Federal Computer<br />

Week, 1999. https://fcw.com/articles/1999/04/11/melissa-tests-dod-procedures.aspx<br />

[Cohen 2009] Cohen, C. & Havrilla J. “Malware Clustering Based on Entry Points.” CERT Research<br />

Annual Report 2008. S<strong>of</strong>tware Engineering Institute, Carnegie Mellon University, 2009.<br />

http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=54240<br />

[Cohen 2010] Cohen, C. & Havrilla J. “Function Hashing for Malicious Code Analysis,” CERT<br />

Research Annual Report 2009. S<strong>of</strong>tware Engineering Institute, Carnegie Mellon University, 2010.<br />

http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=51314<br />

[Cruz 2011] Cruz, Natalie. “Internet Hacker Bruce Raisley Gets Prison for Creating Botnet Computer<br />

Virus.” Newsroom New Jersey, April 17, 2011. http://www.newjerseynewsroom.com/science-updates/internet-hacker-bruce-raisley-gets-prison-for-creating-botnet-computer-virus<br />

(2011).<br />

[Frontline 2000] Power, Richard. “The Financial Costs <strong>of</strong> Computer Crime.” Interviews with security<br />

experts. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks/cost.html (2011).<br />

[Householder 2011] Householder, Alan. “Announcing <strong>the</strong> CERT Basic Fuzzing Framework 2.0.”<br />

CERT/CC Blog February 28, 2011. http://www.cert.org/blogs/certcc/post.cfm?EntryID=66<br />

[Mills 2009] Mills, Elinor. “‘Iceman’ Pleads Guilty in Credit Card Theft Case.” CNET. June 29,<br />

2009. http://news.cnet.com/8301-1009_3-10275442-83.html (2009).<br />

[Ove 2010] Ove, Torsten. “Prolific Computer Hacker Gets 13 Years in Prison.” Pittsburgh Post-<br />

Gazette (February 12, 2010). http://www.post-gazette.com/nation/2010/02/12/Prolific-computerhacker-gets-13-years-in-prison/stories/201002120174<br />

[Poulsen 2008] Poulsen, Kevin. “Feds Charge 11 in Breaches at TJ Maxx, OfficeMax, DSW, O<strong>the</strong>rs.”<br />

Wired. August, 5, 2008. http://www.wired.com/threatlevel/2008/08/11-charged-in-m/<br />

[Ruppe 2001] Ruppe, David. “Hit by Virus, Pentagon Web Site Access Blocked.” ABC News.<br />

July 23, 2001. http://abcnews.go.com/International/story?id=80758&page=1#.Tw8C0vKyBac<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 175<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!