No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells
暂无分享,去创建一个
Thorsten Holz | Nick Nikiforakis | Oleksii Starov | Johannes Dahse | Syed Sharique Ahmad | Thorsten Holz | Nick Nikiforakis | Oleksii Starov | J. Dahse
[1] Guo Xiaojun,et al. Webshell detection techniques in web applications , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[2] Wouter Joosen,et al. You are what you include: large-scale evaluation of remote javascript inclusions , 2012, CCS.
[3] Thorsten Holz,et al. Simulation of Built-in PHP Features for Precise Static Code Analysis , 2014, NDSS.
[4] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[5] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[6] David Kesmodel,et al. The Domain Game: How People Get Rich from Internet Domain Names , 2008 .
[7] Dong-Hoon Yoo,et al. WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection , 2015, J. Inf. Process. Syst..
[8] A. Narayanan,et al. OpenWPM : An automated platform for web privacy measurement , 2016 .
[9] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[10] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..
[11] Davide Balzarotti,et al. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web , 2013, NDSS.
[12] Aurélien Francillon,et al. The role of web hosting providers in detecting compromised websites , 2013, WWW '13.
[13] Thorsten Holz. A Short Visit to the Bot Zoo , 2005, IEEE Secur. Priv..