Manufacturing compromise: the emergence of exploit-as-a-service
暂无分享,去创建一个
Stefan Savage | Geoffrey M. Voelker | Vern Paxson | Niels Provos | Lucas Ballard | Damon McCoy | Christian Rossow | Juan Caballero | Kirill Levchenko | Andreas Pitsillidis | Christian J. Dietrich | Kurt Thomas | Moheeb Abu Rajab | Chris Grier | Antonio Nappa | Neha Chachra | M. Zubair Rafique | Panayiotis Mavrommatis | C. Rossow | V. Paxson | S. Savage | G. Voelker | Christian J. Dietrich | Antonio Nappa | Kurt Thomas | Chris Grier | Damon McCoy | Kirill Levchenko | L. Ballard | Niels Provos | Juan Caballero | Andreas Pitsillidis | M. Rajab | Neha Chachra | P. Mavrommatis
[1] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[2] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[3] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[4] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[5] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[6] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[7] Niels Provos,et al. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.
[8] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[9] Julio Canto,et al. Large scale malware collection : lessons learned , 2008 .
[10] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[11] Andreas Terzis,et al. Peeking Through the Cloud: DNS-Based Estimation and Its Applications , 2008, ACNS.
[12] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[13] Chris Kanich,et al. Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.
[14] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[15] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[16] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[17] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[18] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[19] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[20] Benjamin G. Zorn,et al. Zozzle: Low-overhead Mostly Static JavaScript Malware Detection , 2010 .
[21] Xin Zhao,et al. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution , 2010, LEET.
[22] Dawn Xiaodong Song,et al. Insights from the Inside: A View of Botnet Management from Infiltration , 2010, LEET.
[23] Vern Paxson,et al. What's Clicking What? Techniques and Innovations of Today's Clickbots , 2011, DIMVA.
[24] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[25] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[26] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[27] Christopher Krügel,et al. Understanding fraudulent activities in online ad exchanges , 2011, IMC '11.
[28] Chris Kanich,et al. GQ: practical containment for measuring modern malware systems , 2011, IMC '11.
[29] Gianluca Stringhini,et al. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.
[30] Benjamin Livshits,et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection , 2011, USENIX Security Symposium.
[31] Christopher Krügel,et al. The Underground Economy of Fake Antivirus Software , 2011, WEIS.
[32] Felix C. Freiling,et al. Sandnet: network traffic analysis of malicious software , 2011, BADGERS '11.
[33] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Ulrich Flegel,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2012, Lecture Notes in Computer Science.
[35] jason. jones. State of Web Exploit Kits , 2012 .
[36] Herbert Bos,et al. Large-Scale Analysis of Malware Downloaders , 2012, DIMVA.