Detection and analysis of drive-by-download attacks and malicious JavaScript code
暂无分享,去创建一个
[1] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[2] Stefan Frei,et al. Understanding the web browser threat: examination of vulnerable online web browser populations and the "insecurity iceberg" , 2008 .
[3] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[4] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[5] Charlie Miller,et al. Engineering Heap Overflow Exploits with JavaScript , 2008, WOOT.
[6] Ian Welch,et al. Identification of malicious web pages through analysis of underlying DNS and web server relationships , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[7] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[8] Niels Provos,et al. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.
[9] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[10] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[11] C. Seifert. Know Your Enemy: Malicious Web Servers , 2007 .
[12] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[13] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[14] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[15] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[17] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[18] Felix C. Freiling,et al. Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients , 2008, Sicherheit.
[19] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.
[20] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[21] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.
[22] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.