Revolver: An Automated Approach to the Detection of Evasive Web-based Malware
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | Marco Cova | Yan Shoshitaishvili | Alexandros Kapravelos | Yan Shoshitaishvili | Christopher Krügel | M. Cova | A. Kapravelos | G. Vigna
[1] Nicholas A. Kraft,et al. Clone evolution: a systematic review , 2011, J. Softw. Evol. Process..
[2] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[3] Benjamin Livshits,et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection , 2011, USENIX Security Symposium.
[4] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[5] Benjamin G. Zorn,et al. Zozzle: Low-overhead Mostly Static JavaScript Malware Detection , 2010 .
[6] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[7] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[8] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[9] Peter Martini,et al. Classification and detection of metamorphic malware using value set analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[10] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[11] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[12] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[13] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .
[14] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[15] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[16] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[17] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[18] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[19] Christopher Krügel,et al. Escape from Monkey Island: Evading High-Interaction Honeyclients , 2011, DIMVA.
[20] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[21] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[22] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[23] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[24] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[25] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[26] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[27] Benjamin Livshits,et al. Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.
[28] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[29] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.