WeXpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
暂无分享,去创建一个
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[3] Heng Yin,et al. HookScout: Proactive Binary-Centric Hook Detection , 2010, DIMVA.
[4] Stefan Berger,et al. BISSAM: Automatic Vulnerability Identification of Office Documents , 2012, DIMVA.
[5] Sandro Etalle,et al. On Emulation-Based Network Intrusion Detection Systems , 2014, RAID.
[6] Qin Zhao,et al. Transparent dynamic instrumentation , 2012, VEE '12.
[7] Evangelos P. Markatos,et al. Network-level polymorphic shellcode detection using emulation , 2006, Journal in Computer Virology.
[8] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[9] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[10] Niels Provos,et al. SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks , 2011, USENIX Security Symposium.
[11] Andrew Honig,et al. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012 .
[12] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.
[13] Makoto Shimamura,et al. Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks , 2009, DIMVA.
[14] Jon Erickson,et al. Hacking: The Art of Exploitation , 2008 .
[15] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[17] Yanick Fratantonio,et al. Andrubis: Android Malware Under the Magnifying Glass , 2014 .
[18] R. Sekar. An Efficient Black-box Technique for Defeating Web Application Attacks , 2009, NDSS.
[19] Abhinav Srivastava,et al. Automatic Discovery of Parasitic Malware , 2010, RAID.
[20] Angelos D. Keromytis,et al. Fast and practical instruction-set randomization for commodity systems , 2010, ACSAC '10.
[21] Christopher Kruegel Lastline. Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware , 2014 .
[22] Stefano Zanero,et al. Detecting Intrusions through System Call Sequence and Argument Analysis , 2010, IEEE Transactions on Dependable and Secure Computing.