Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls
暂无分享,去创建一个
[1] Andreas Dewald,et al. ADSandbox: sandboxing JavaScript to fight malicious websites , 2010, SAC '10.
[2] Margo McCall,et al. IEEE Computer Society , 2019, Encyclopedia of Software Engineering.
[3] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[4] Eunjin Jung,et al. Obfuscated malicious javascript detection using classification techniques , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[5] Lucas Chi Kwong Hui,et al. Color Set Size Problem with Application to String Matching , 1992, CPM.
[6] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[7] Dan Gusfield. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[8] Dong Hoon Lee,et al. JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking , 2012, KSII Trans. Internet Inf. Syst..
[9] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .
[10] Zhang,et al. Debugging Tools来了,不再怕Windows的“大蓝脸” , 2008 .
[11] Ramarathnam Venkatesan,et al. Pattern Mining for Future Attacks , 2009 .
[12] Benjamin Livshits,et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection , 2011, USENIX Security Symposium.
[13] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[14] Wei Xu,et al. The power of obfuscation techniques in malicious JavaScript code: A measurement study , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[15] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.