Cybercrime 2.0: when the cloud turns dark
暂无分享,去创建一个
[1] Adam Barth,et al. The Security Architecture of the Chromium Browser , 2009 .
[2] Niels Provos,et al. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.
[3] Zhenkai Liang,et al. BitScope: Automatically Dissecting Malicious Binaries , 2007 .
[4] Samuel T. King,et al. Secure Web Browsing with the OP Web Browser , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[5] Niels Provos,et al. To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads , 2008, USENIX Security Symposium.
[6] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[7] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).