Cloud repository as a malicious service: challenge, identification and implication
暂无分享,去创建一个
Raheem Beyah | Shuang Hao | XiaoFeng Wang | Luyi Xing | Xiaojing Liao | Sumayah A. Alrwais | Kan Yuan
[1] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Douglas Jacobson,et al. Detecting fraudulent use of cloud resources , 2011, CCSW '11.
[3] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] William W. Cohen,et al. A Comparison of String Metrics for Matching Names and Records , 2003 .
[5] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[6] Edgar R. Weippl,et al. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.
[7] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[8] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[10] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[11] Xiao Han,et al. The Role of Cloud Services in Malicious Software: Trends and Insights , 2015, DIMVA.
[12] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] Nick Feamster,et al. Understanding the domain registration behavior of spammers , 2013, Internet Measurement Conference.
[14] Elaine Shi,et al. Characterizing Long-tail SEO Spam on Cloud Web Hosting Services , 2016, WWW.
[15] Christopher Krügel,et al. Nazca: Detecting Malware Distribution in Large-Scale Networks , 2014, NDSS.
[16] Roberto Perdisci,et al. WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths , 2015, USENIX Security Symposium.
[17] Tyler Moore,et al. Fashion crimes: trending-term exploitation on the web , 2011, CCS '11.
[18] Lawrence K. Saul,et al. Knock it off: profiling the online storefronts of counterfeit merchandise , 2014, KDD.
[19] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[20] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[21] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.