Analyzing "Not-a-Virus" Bundled Adware: The Wajam Case
暂无分享,去创建一个
[1] Deepak Kumar,et al. Tracking Certificate Misissuance in the Wild , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[2] Zexin Lu,et al. Survey on malware anti-analysis , 2014, Fifth International Conference on Intelligent Control and Information Processing.
[3] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[4] Christopher Krügel,et al. PExy: The Other Side of Exploit Kits , 2014, DIMVA.
[5] Mohammad Mannan,et al. Killed by Proxy: Analyzing Client-end TLS Interce , 2016, NDSS.
[6] Herbert Bos,et al. Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[7] Leyla Bilge,et al. Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services , 2016, USENIX Security Symposium.
[8] Juan Caballero,et al. Certified PUP: Abuse in Authenticode Code Signing , 2015, CCS.
[9] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[10] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[11] Paul Black,et al. Anti-analysis trends in banking malware , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).
[12] jason. jones. State of Web Exploit Kits , 2012 .
[13] Suhaimi Ibrahim,et al. Camouflage in Malware: from Encryption to Metamorphism , 2012 .
[14] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[15] Guofei Gu,et al. Conficker and beyond: a large-scale empirical study , 2010, ACSAC '10.
[16] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[17] Chris Sharp,et al. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software , 2016, USENIX Security Symposium.
[18] P. McFedries. Technically Speaking: The Spyware Nightmare , 2005, IEEE Spectrum.
[19] Wouter Joosen,et al. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation , 2018, NDSS.
[20] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[21] Aditya K. Sood,et al. Covering the global threat landscape PROSECTING THE CITADEL BOTNET – REVEALING THE DOMINANCE OF THE ZEUS DESCENDENT , 2014 .
[22] Juan Caballero,et al. Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting , 2013, DIMVA.