"NOFUS: Automatically Detecting" + String.fromCharCode(32) + "ObFuSCateD ".toLowerCase() + "JavaScript Code"
暂无分享,去创建一个
Ben Zorn | Ben Livshits | Scott F. Kaplan | Scott Kaplan | Christian Siefert | Charlie Cursinger | B. Livshits | B. Zorn | Christian Siefert | Charlie Cursinger
[1] Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript , 2007 .
[2] Sorin Lerner,et al. Staged information flow for javascript , 2009, PLDI '09.
[3] Benjamin Livshits,et al. GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code , 2009, USENIX Security Symposium.
[4] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[5] YoungHan Choi,et al. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis , 2009, FGIT.
[6] Byung-Ik Kim,et al. Suspicious Malicious Web Site Detection with Strength Analysis of a JavaScript Obfuscation , 2010 .
[7] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[8] Benjamin G. Zorn,et al. Zozzle: Low-overhead Mostly Static JavaScript Malware Detection , 2010 .
[9] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .
[10] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.