-
- Regalado, D., Villeneuve, N. & Railton Scott, J. (2015) Behind the Syrian Conflict’s Digital Frontlines
-
- Villeneuve, N., Moran, N., Haq, T. & Scott, Mike. (2014) Operation Saffron Rose
-
- Villeneuve, N., Bennett, J. et al. (2013) Operation ‘Ke3chang’: Targeted Attacks Against Ministries of Foreign Affairs
-
- Bennett, J., Moran, N. & Villeneuve, N.(2013) Poison Ivy: Assessing Damage and Extracting Intelligence
-
- Villeneuve, N. & Wilhoit, K. (2013) Safe: A Targeted Threat
-
- Villeneuve, N., Dela Torre, J. & Sancho D. (2013) Asprox Reborn
-
- Villeneuve, N. & Dela Torre, J. (2013) FAKEM RAT: Malware Disguised as Windows Messenger and Yahoo! Messenger
-
- Villeneuve, N. & Bennett, J. (2012) Detecting APT Activity with Network Traffic Analysis.
-
- Trend Micro. (2012). Adding Android and Mac OS X Malware to the APT Toolbox.
-
- Sancho, Dela Torre, Mastukawa, Villeneuve & McArdle. (2012). IXESHE: An APT Campaign.
-
- Forward Looking Threat Research (2012). Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan.
-
- Villeneuve, N. (2011). Trends in Targeted Attacks.
-
- Villeneuve, N. & Sancho, D. (2011). Dissecting the LURID APT – campaign, attacks, tactics and victims.
-
- Villeneuve, N. (2011). Targeting the Source: FAKEAV Affiliate Networks.
-
- Villeneuve, N. and Crete-Nishihata, M. (2011) Control and Resistance: Attacks on Burmese Opposition Media Access Contested: Security, identity, and resistance in Asian cyberspace Eds. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain. Cambridge, MA: MIT Press. (mirror)
-
- Villeneuve N. (2010). Koobface: Inside a Crimeware Network.
-
- Information Warfare Monitor. (2010). Shadows in the Cloud: An investigation into cyber espionage 2.0. (mirror)
-
- Villeneuve N. (2010). The “Kneber” Botnet, Spear Phishing Attacks and Crimeware.
-
- Villeneuve, N. (2010) Barriers to cooperation: An analysis of the origins of international efforts to protect children online Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace Eds. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain. Cambridge, MA: MIT Press. (mirror)
-
- Information Warfare Monitor. (2009). Tracking GhostNet: Investigating a Cyber Espionage Network. (mirror)
-
- Villeneuve, N. (2008). Breaching Trust: An analysis of surveillance and security practices on China’s TOM-Skype platform. (mirror)
-
- Rob Faris and Nart Villeneuve. (2008). Measuring Global Internet Filtering. Access Denied: The Practice and Policy of Global Internet Filtering Eds. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain. Cambridge, MA: MIT Press.
(mirror)
- Rob Faris and Nart Villeneuve. (2008). Measuring Global Internet Filtering. Access Denied: The Practice and Policy of Global Internet Filtering Eds. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain. Cambridge, MA: MIT Press.
-
- Villeneuve, N. (2008). Search Monitor Project: Toward a Measure of Transparency. (mirror)
-
- Villeneuve, N. (2007). Evasion tactics: Global online censorship is growing, but so are the means to challenge it and protect privacy. Index on Censorship. (36, 4), 71 – 85. (mirror)
-
- Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday. (11,1). (mirror)
-
- Deibert R. and Villeneuve, N. (2005). Firewalls and Power: An Overview of Global State Censorship of the Internet. Human Rights in the Digital Age. Eds. Mathias Klang and Andrew Murray. Portland, Or.: GlassHouse.
Testimony
- Submission by Nart Villeneuve
Villeneuve N. (2012). “Submission by Nart Villeneuve”, U.S.-China Economic and Security Review Commission Hearing on “Developments in China’s Cyber and Nuclear Capabilities” – March 26, 2012. (mirror) - Testimony of Nart Villeneuve (mirror)
Villeneuve N. (2006). “Testimony of Nart Villeneuve”, Congressional Human Rights Caucus Member’s Briefing on Human Rights and the Internet – Wednesday, February 1, 2006. - Statement of Nart Villeneuve
Villeneuve, N. (2005). “Statement of Nart Villeneuve” in Hearing on China’s State Control Mechanisms and Methods (U.S. Government Printing Office) U.S.-China Economic and Security Review Commission.
Guides
- Citizen Lab. (2007). Everyone’s Guide to Bypassing Internet Censorship. Citizen Lab. (mirror)
- Villeneuve, N. (2005). Choosing Circumvention: Technical Ways To Get Around Censorship. Handbook for Bloggers and Cyber-dissidents. Reporters Without Borders. (mirror)