This technique has been first described in a paper published on Virus Bulletin 2009 annual conference by Anoirel Issa, malware Analyst for the Symantec Hosted Services, formerly MessageLabs.
Massive Attack | Attack on Pearl Harbor | attack on Pearl Harbor | Linux distribution | Star Wars Episode II: Attack of the Clones | attack | distribution | CBS Television Distribution | Distribution (business) | Normal distribution | suicide attack | MGM Distribution | American Jewish Joint Distribution Committee | 2012 Benghazi attack | Small Press Distribution | Joint Direct Attack Munition | Jack-Jack Attack | Cosmopolitan distribution | Cauchy distribution | Attack Attack! | Suicide attack | RED Distribution | Railfreight Distribution | probability distribution | normal distribution | Milltown Cemetery attack | Liquor Distribution Branch | Godzilla, Mothra and King Ghidorah: Giant Monsters All-Out Attack | Fontana Distribution | distribution (mathematics) |