ADSandbox: sandboxing JavaScript to fight malicious websites
暂无分享,去创建一个
[1] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[2] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[3] Helen J. Wang,et al. Strider: a black-box, state-based approach to change and configuration management and support , 2003, Sci. Comput. Program..
[4] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[5] Evangelos P. Markatos,et al. STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis , 2005, SEC.
[6] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[7] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[8] Benjamin Livshits,et al. Spectator: Detection and Containment of JavaScript Worms , 2008, USENIX Annual Technical Conference.
[9] Steven D. Gribble,et al. A safety-oriented platform for Web applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).