Cybercrime 2.0: when the cloud turns dark

Web-based malware attacks are more insidious than ever. What can be done to stem the tide?

[1]  Adam Barth,et al.  The Security Architecture of the Chromium Browser , 2009 .

[2]  Niels Provos,et al.  Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.

[3]  Zhenkai Liang,et al.  BitScope: Automatically Dissecting Malicious Binaries , 2007 .

[4]  Samuel T. King,et al.  Secure Web Browsing with the OP Web Browser , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[5]  Niels Provos,et al.  To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads , 2008, USENIX Security Symposium.

[6]  Niels Provos,et al.  All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.

[7]  Christopher Krügel,et al.  Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).