메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 1-18

Learning more about the underground economy: A case-study of keyloggers and dropzones

Author keywords

[No Author keywords available]

Indexed keywords

DATA SETS; DIGITAL CREDENTIALS; EMPIRICAL STUDIES; KEYLOGGERS;

EID: 70350357344     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_1     Document Type: Conference Paper
Times cited : (109)

References (38)
  • 3
    • 70350393787 scopus 로고    scopus 로고
    • Anonymous. Comment about posting Good ol' #CCpower on honeyblog (June 2008), http://honeyblog.org/archives/194-CCpower-Only-Scam.html
    • Anonymous. Comment about posting "Good ol' #CCpower" on honeyblog (June 2008), http://honeyblog.org/archives/194-CCpower-Only-Scam.html
  • 4
    • 84925280074 scopus 로고    scopus 로고
    • Home Page 2009
    • AutoIt Script Home Page (2009), http://www.autoitscript.com/
    • AutoIt Script
  • 9
    • 70350426845 scopus 로고    scopus 로고
    • April 2008
    • Finjan: Malicious Page of the Month (April 2008), http://www.finjan.com/ Content.aspx?id=1367
    • Malicious Page of the Month
  • 11
    • 70350414372 scopus 로고    scopus 로고
    • Gajek, S., Sadeghi, A.-R.: A Forensic Framework for Tracing Phishers. In: IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden (August 2007)
    • Gajek, S., Sadeghi, A.-R.: A Forensic Framework for Tracing Phishers. In: IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden (August 2007)
  • 12
    • 70350410066 scopus 로고    scopus 로고
    • Herley, C., Florencio, D.: How To Login From an Internet Cafe Without Worrying About Keyloggers. In: Symposium on Usable Privacy and Security, SOUPS (2006)
    • Herley, C., Florencio, D.: How To Login From an Internet Cafe Without Worrying About Keyloggers. In: Symposium on Usable Privacy and Security, SOUPS (2006)
  • 13
    • 70350402262 scopus 로고    scopus 로고
    • Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
    • Technical Report TR-2008-006, University of Mannheim
    • Holz, T., Engelberth, M., Freiling, F.: Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. Technical Report TR-2008-006, University of Mannheim (2008)
    • (2008)
    • Holz, T.1    Engelberth, M.2    Freiling, F.3
  • 14
    • 70449690094 scopus 로고    scopus 로고
    • Internet Crime Complaint Center IC3, March
    • Internet Crime Complaint Center (IC3). 2008 Internet Crime Report (March 2009), http://www.ic3.gov/media/annualreports.aspx
    • (2008) Internet Crime Report
  • 18
    • 70350393786 scopus 로고    scopus 로고
    • August 2008
    • MaxMind LLC. MaxMind GeoIP (August 2008), http://www.maxmind.com/app/ip- location
    • GeoIP
  • 19
    • 51849127252 scopus 로고
    • Computer for Verifying
    • Numbers August, U.S. Patent 2,950,048
    • Luhn, H.P.: Computer for Verifying Numbers (August 1960) U.S. Patent 2,950,048
    • (1960)
    • Luhn, H.P.1
  • 20
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • December
    • Martin, J., Thomas, R.: The underground economy: priceless. USENIX; login: 31(6) (December 2006)
    • (2006) USENIX; login , vol.31 , Issue.6
    • Martin, J.1    Thomas, R.2
  • 22
    • 70350406385 scopus 로고    scopus 로고
    • Microsoft. Protected Storage (Pstore), Microsoft Developer Network (MSDN) (August 2008)
    • Microsoft. Protected Storage (Pstore), Microsoft Developer Network (MSDN) (August 2008)
  • 25
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Newsome, J., Song, D.X.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Network and Distributed System Security Symposium, NDSS (2005)
    • (2005) Network and Distributed System Security Symposium, NDSS
    • Newsome, J.1    Song, D.X.2
  • 29
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the Network-Level Behavior of Spammers
    • Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. SIGCOMM Comput. Commun. Rev. 36(4), 291-302 (2006)
    • (2006) SIGCOMM Comput. Commun. Rev , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 30
    • 70350431699 scopus 로고    scopus 로고
    • June 2007
    • SecureWorks. PRG Trojan (June 2007), http://www.secureworks.com/research/ threats/prgtrojan/
    • Trojan
  • 31
    • 70350402263 scopus 로고    scopus 로고
    • August
    • SecureWorks. Coreflood Report (August. 2008), http://www.secureworks.com/ research/threats/coreflood-report/
    • (2008) Coreflood Report
  • 33
    • 70350376101 scopus 로고    scopus 로고
    • Symantec: Global Internet Security Threat Report: Trends for July - December 07 (April 2008)
    • Symantec: Global Internet Security Threat Report: Trends for July - December 07 (April 2008)
  • 37
    • 34047110218 scopus 로고    scopus 로고
    • Toward Automated Dynamic Malware Analysis Using CWSandbox
    • Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy Magazine 5(2), 32-39 (2007)
    • (2007) IEEE Security & Privacy Magazine , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.