BLADE: an attack-agnostic approach for preventing drive-by malware infections
暂无分享,去创建一个
[1] Alan H. Karp,et al. Polaris: virus-safe computing for Windows XP , 2006, CACM.
[2] Louisa Flintoft. Know your enemy , 2003, Nature Reviews Cancer.
[3] Ashvin Goel,et al. Application-level isolation and recovery with solitude , 2008, Eurosys '08.
[4] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.
[5] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[6] Helen J. Wang,et al. A Systematic Approach to Uncover Security Flaws in GUI Logic , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Adam Barth,et al. The Security Architecture of the Chromium Browser , 2009 .
[8] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[9] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[10] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[11] C. Seifert. Know Your Enemy: Malicious Web Servers , 2007 .
[12] Helen J. Wang,et al. The Multi-Principal OS Construction of the Gazelle Web Browser , 2009, USENIX Security Symposium.
[13] Sven Dietrich,et al. Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.
[14] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[15] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[16] Adam Barth,et al. Protecting Browsers from Extension Vulnerabilities , 2010, NDSS.
[17] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[18] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.
[19] Dawn Song,et al. Malware Detection (Advances in Information Security) , 2006 .
[20] Helen J. Wang,et al. BrowserShield: vulnerability-driven filtering of dynamic HTML , 2006, OSDI '06.
[21] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[22] Zhenkai Liang,et al. Isolated program execution: an application transparent approach for executing untrusted programs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[23] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[24] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[25] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.