Catching predators at watering holes: finding and understanding strategically compromised websites
暂无分享,去创建一个
Zhou Li | Alina Oprea | XiaoFeng Wang | Xiaojing Liao | Eihal Alowaisheq | Sumayah A. Alrwais | Kan Yuan
[1] Vern Paxson,et al. When Governments Hack Opponents: A Look at Actors and Technology , 2014, USENIX Security Symposium.
[2] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[3] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[4] Charu C. Aggarwal,et al. Outlier Analysis , 2013, Springer New York.
[5] Aurélien Francillon,et al. The role of web hosting providers in detecting compromised websites , 2013, WWW '13.
[6] Tyler Moore,et al. Identifying Risk Factors for Webserver Compromise , 2014, Financial Cryptography.
[7] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Josef Kittler,et al. Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.
[9] Leyla Bilge,et al. Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat , 2012, RAID.
[10] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[11] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[12] Adam Senft,et al. Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware , 2014, USENIX Security Symposium.
[13] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[14] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[15] Engin Kirda,et al. A Look at Targeted Attacks Through the Lense of an NGO , 2014, USENIX Security Symposium.
[16] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[17] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[18] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[19] Davide Balzarotti,et al. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web , 2013, NDSS.
[20] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[21] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.