Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections
暂无分享,去创建一个
Zhou Li | XiaoFeng Wang | Eihal Alowaisheq | Sumayah A. Alrwais | Xiaofeng Wang | Zhou Li | E. Alowaisheq
[1] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[2] Johnny Long,et al. Google Hacking for Penetration Testers , 2004 .
[3] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[4] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[5] Tadayoshi Kohno,et al. Detecting In-Flight Page Changes with Web Tripwires , 2008, NSDI.
[6] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[7] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[8] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[9] Jack W. Stokes,et al. WebCop: Locating Neighborhoods of Malware on the Web , 2010, LEET.
[10] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[11] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[12] Stefan Savage,et al. Cloak and dagger: dynamics of web search cloaking , 2011, CCS '11.
[13] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[14] Wenke Lee,et al. SURF: detecting and measuring search poisoning , 2011, CCS '11.
[15] Benjamin Livshits,et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection , 2011, USENIX Security Symposium.
[16] Benjamin Livshits,et al. Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[18] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[19] Fang Yu,et al. Knowing your enemy: understanding and detecting malicious web advertising , 2012, CCS '12.
[20] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[21] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[22] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[23] Christopher Krügel,et al. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware , 2013, USENIX Security Symposium.
[24] Aurélien Francillon,et al. The role of web hosting providers in detecting compromised websites , 2013, WWW '13.
[25] Davide Balzarotti,et al. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web , 2013, NDSS.
[26] Tyler Moore,et al. Financial Cryptography and Data Security , 2014, Lecture Notes in Computer Science.