Spyware and Adware

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

[1]  A. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[2]  Jon Erickson,et al.  Hacking: The Art of Exploitation , 2008 .

[3]  Edward W. Felten,et al.  Timing attacks on Web privacy , 2000, CCS.

[4]  Heng Yin,et al.  Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[6]  James A. Haskett,et al.  Pass-algorithms: a user validation scheme based on knowledge of secret algorithms , 1984, CACM.

[7]  Mark P. Zanna,et al.  Subliminal priming and persuasion: Striking while the iron is hot , 2002 .

[8]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[9]  R. Power CSI/FBI computer crime and security survey , 2001 .

[10]  Jan Panero Benway,et al.  Banner Blindness: The Irony of Attention Grabbing on the World Wide Web , 1998 .

[11]  C. Yoo,et al.  Processing of animation in online banner advertising: The roles of cognitive and emotional responses , 2005 .

[12]  Moti Yung,et al.  Fourth-factor authentication: somebody you know , 2006, CCS '06.

[13]  Greg Hoglund,et al.  Rootkits: Subverting the Windows Kernel , 2005 .

[14]  Marie-Francine Moens,et al.  Automatic Indexing and Abstracting of Document Texts , 2000, Computational Linguistics.

[15]  Ankit Fadia Network Security , 2002 .

[16]  Niels Provos,et al.  All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.

[17]  Umesh Shankar,et al.  Doppelganger: Better browser privacy without the bother , 2006, CCS '06.

[18]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[19]  Clifford Stoll,et al.  Stalking the wily hacker , 1988, CACM.

[20]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[21]  Joshua Goodman,et al.  Finding advertising keywords on web pages , 2006, WWW '06.

[22]  Kimball P. Marshall,et al.  Marketing and Internet Professionals' Fiduciary Responsibility: A Perspective on Spyware , 2006 .

[23]  James P. Davis Spyware Protection: Seek and Destroy Embedded Bugs , 2007 .

[24]  M. Hupfer,et al.  Getting Something for Nothing , 2005 .

[25]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[26]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[27]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[28]  Balachander Krishnamurthy,et al.  Generating a privacy footprint on the internet , 2006, IMC '06.

[29]  Sy-Yen Kuo,et al.  Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.

[30]  Drew Hintz,et al.  Covert Channels in TCP and IP headers , 2009 .

[31]  J. Abbate,et al.  Inventing the Internet , 1999 .

[32]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[33]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2009 .

[34]  Janice C. Sipior,et al.  The Ethical and Legal Concerns of Spyware , 2005, Inf. Syst. Manag..

[35]  Naveen Donthu,et al.  Emotional Appeal and Incentive Offering in Banner Advertisements , 2004 .

[36]  Johnny Lim Defeat spyware with anti-screen capture technology using visual persistence , 2007, SOUPS '07.

[37]  A. Lenhart,et al.  Music Downloading and Listening: Findings from the Pew Internet and American Life Project , 2004 .

[38]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[39]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[40]  Steve Gibson,et al.  Spyware was inevitable , 2005, CACM.

[41]  Bruce Schneier,et al.  Two-factor authentication: too little, too late , 2005, CACM.

[42]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[43]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[44]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[45]  Daniel B. Garrie,et al.  Parasiteware: Unlocking Personal Privacy , 2006 .

[46]  Christopher Krügel,et al.  Behavior-based Spyware Detection , 2006, USENIX Security Symposium.

[47]  Sarah Granger,et al.  Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .

[48]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[49]  Charles F. Hofacker,et al.  Clickable World Wide Web banner ads and content sites , 2000 .

[50]  Markus Jakobsson,et al.  Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .

[51]  C. Gray Girling,et al.  Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.

[52]  John Aycock,et al.  Viruses 101 , 2005 .

[53]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[54]  Mirina Grosz,et al.  World Wide Web Consortium , 2010 .

[55]  Wei-Ming Hu,et al.  Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[56]  Niels Provos,et al.  The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.

[57]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[58]  John Maxtone-Graham,et al.  The Only Way to Cross , 1972 .

[59]  Heng Yin,et al.  Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.

[60]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[61]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[62]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[63]  Balachander Krishnamurthy,et al.  Measuring privacy loss and the impact of privacy protection in web browsing , 2007, SOUPS '07.

[64]  P. Sleight Targeting customers : how to use geodemographic and lifestyle data in your business , 2004 .

[65]  Sung-Joon Yoon An experimental approach to understanding banner adverts' effectiveness , 2003 .

[66]  M. Browne,et al.  Alternative Ways of Assessing Model Fit , 1992 .

[67]  Claire Allison Stammerjohan,et al.  BANNER ADVERTISER-WEB SITE CONTEXT CONGRUITY AND COLOR EFFECTS ON ATTENTION AND ATTITUDES , 2005 .

[68]  Andrea Everard,et al.  The effects of online advertising , 2007, Commun. ACM.

[69]  John Aycock Teaching Spam and Spyware at the University of C@1g4ry , 2006, CEAS.

[70]  Viktor Krammer,et al.  An Effective Defense against Intrusive Web Advertising , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[71]  C. Yoo,et al.  Assessing the Effects of Animation in Online Banner Advertising , 2004 .

[72]  David Salomon,et al.  Coding for Data and Computer Communications , 2005 .

[73]  John Aycock,et al.  Computer Viruses and Malware , 2006, Advances in Information Security.

[74]  Shelly Rodgers,et al.  The Interactive Advertising Model , 2000 .

[75]  Wendy W. Moe,et al.  The Influence of Goal‐Directed and Experiential Activities on Online Flow Experiences , 2003 .

[76]  Clinton G. Carr,et al.  Reverse Geographic Location of a Computer Node , 2012 .

[77]  Lance J. Hoffman,et al.  Computers and Privacy: A Survey , 1969, CSUR.

[78]  Bill Cheswick Johnny Can Obfuscate: Beyond Mother's Maiden Name , 2006, HotSec.

[79]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[80]  R. Burchfield Oxford English dictionary , 1982 .

[81]  Anthony P. Badali,et al.  Intelligent ad resizing , 2010, WWW '10.

[82]  Xiaoni Zhang,et al.  What do consumers really know about spyware? , 2005, CACM.

[83]  John Aycock,et al.  Black Market Botnets , 2007 .

[84]  David Elliott Bell,et al.  Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[85]  Tom Stafford,et al.  Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..

[86]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[87]  Barry G. Evans,et al.  Systems and Services , 2007 .

[88]  Markus Jakobsson,et al.  Distributed Phishing Attacks , 2005, IACR Cryptol. ePrint Arch..

[89]  R. MacCallum,et al.  Power analysis and determination of sample size for covariance structure modeling. , 1996 .

[90]  Xuxian Jiang,et al.  Countering kernel rootkits with lightweight hook protection , 2009, CCS.

[91]  Carla E. Brodley,et al.  IP Covert Channel Detection , 2009, TSEC.

[92]  Nicholas Kushmerick,et al.  Learning to remove Internet advertisements , 1999, AGENTS '99.

[93]  Helen J. Wang,et al.  SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[94]  Felix C. Freiling,et al.  Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.

[95]  Hairong Li,et al.  Cognitive Impact of Banner Ad Characteristics: An Experimental Study , 1999 .

[96]  Samuel T. King,et al.  Backtracking intrusions , 2003, SOSP '03.

[97]  G. McNair,et al.  Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.

[98]  Dan Boneh,et al.  Protecting browser state from web privacy attacks , 2006, WWW '06.

[99]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[100]  Roger Thompson,et al.  Why spyware poses multiple threats to security , 2005, CACM.

[101]  Mihai Chiriac TALES FROM CLOUD NINE , 2009 .

[102]  Chris Jay Hoofnagle,et al.  Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.

[103]  Kevin Borders,et al.  Siren: catching evasive malware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[104]  Lee Sherman,et al.  Banner advertising: Measuring effectiveness and optimizing placement , 2001 .

[105]  I. Ajzen Attitudes, Personality and Behavior , 1988 .

[106]  Mun Choon Chan,et al.  Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.

[107]  Hao Wang,et al.  NetSpy: Automatic Generation of Spyware Signatures for NIDS , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[108]  Charles F. Hofacker,et al.  World Wide Web banner advertisement copy testing , 1998 .

[109]  I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .

[110]  Ethan R. Burris,et al.  Negotiator confidence: The impact of self-efficacy on tactics and outcomes , 2006 .

[111]  Richard Gatarski,et al.  Breed better banners: Design automation through on-line interaction , 2002 .

[112]  Karen Sweaney The Oprah Effect , 2011 .

[113]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.