Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web
暂无分享,去创建一个
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] Daniel J. Quinlan,et al. Detecting code clones in binary executables , 2009, ISSTA.
[3] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[4] Vassil Roussev,et al. Data Fingerprinting with Similarity Digests , 2010, IFIP Int. Conf. Digital Forensics.
[5] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[6] W. Marsden. I and J , 2012 .
[7] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[8] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..
[9] Marc Dacier,et al. SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models , 2008, 2008 Seventh European Dependable Computing Conference.
[10] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[11] Jeanna Neefe Matthews,et al. A Generic Toolkit for Converting Web Applications Into High-Interaction Honeypots , 2007 .
[12] Van-Hau Pham,et al. on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .
[13] Xin Chen,et al. Shared information and program plagiarism detection , 2004, IEEE Transactions on Information Theory.
[14] Matthieu Herrb,et al. Set-up and deployment of a high-interaction honeypot: experiment and lessons learned , 2011, Journal in Computer Virology.
[15] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[16] Robin Berthier,et al. Profiling Attacker Behavior Following SSH Compromises , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[17] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[18] Martín Abadi,et al. Heat-seeking honeypots: design and experience , 2011, WWW.