Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks
暂无分享,去创建一个
Andreas Dewald | Konrad Rieck | Tammo Krueger | K. Rieck | T. Krueger | Andreas Dewald | Konrad Rieck | Tammo Krueger
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[3] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Alexander J. Smola,et al. Learning with kernels , 1998 .
[5] Gunnar Rätsch,et al. An introduction to kernel-based learning algorithms , 2001, IEEE Trans. Neural Networks.
[6] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[7] Wenke Lee,et al. q-gram matching using tree models , 2006 .
[8] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[9] Konrad Rieck,et al. Detecting Unknown Network Attacks Using Language Models , 2006, DIMVA.
[10] Martin Johns,et al. On JavaScript Malware and related threats , 2008, Journal in Computer Virology.
[11] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[12] Konrad Rieck,et al. Linear-Time Computation of Similarity Measures for Sequential Data , 2008, J. Mach. Learn. Res..
[13] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[14] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[15] Charlie Miller,et al. Engineering Heap Overflow Exploits with JavaScript , 2008, WOOT.
[16] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[17] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[18] Christopher Krügel,et al. Mitigating Drive-By Download Attacks: Challenges and Open Problems , 2009, iNetSeC.
[19] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.
[20] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[21] Andreas Dewald,et al. ADSandbox: sandboxing JavaScript to fight malicious websites , 2010, SAC '10.