-
2
-
-
84949626334
-
Spamscatter: Characterizing Internet Scam Hosting Infrastructure
-
Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In: USENIX Security Symposium (2007)
-
(2007)
USENIX Security Symposium
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
3
-
-
70350393787
-
-
Anonymous. Comment about posting Good ol' #CCpower on honeyblog (June 2008), http://honeyblog.org/archives/194-CCpower-Only-Scam.html
-
Anonymous. Comment about posting "Good ol' #CCpower" on honeyblog (June 2008), http://honeyblog.org/archives/194-CCpower-Only-Scam.html
-
-
-
-
4
-
-
84925280074
-
-
Home Page 2009
-
AutoIt Script Home Page (2009), http://www.autoitscript.com/
-
AutoIt Script
-
-
-
5
-
-
33845926633
-
PHONEY: Mimicking User Response to Detect Phishing Attacks
-
Chandrasekaran, M., Chinchani, R., Upadhyaya, S.: PHONEY: Mimicking User Response to Detect Phishing Attacks. In: Symposium on World of Wireless, Mobile and Multimedia Networks, WoWMoM (2006)
-
(2006)
Symposium on World of Wireless, Mobile and Multimedia Networks, WoWMoM
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
6
-
-
58049211916
-
Pharewell to Phishing
-
Choi, T., Son, S., Gouda, M., Cobb, J.: Pharewell to Phishing. In: Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS (2008)
-
(2008)
Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS
-
-
Choi, T.1
Son, S.2
Gouda, M.3
Cobb, J.4
-
7
-
-
85044841595
-
Client-Side Defense Against Web-Based Identity Theft
-
Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-Side Defense Against Web-Based Identity Theft. In: Network and Distributed System Security Symposium, NDSS (2004)
-
(2004)
Network and Distributed System Security Symposium, NDSS
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.C.4
-
9
-
-
70350426845
-
-
April 2008
-
Finjan: Malicious Page of the Month (April 2008), http://www.finjan.com/ Content.aspx?id=1367
-
Malicious Page of the Month
-
-
-
10
-
-
77952415099
-
An Inquiry Into the Nature and Causes of the Wealth of Internet Miscreants
-
CCS
-
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An Inquiry Into the Nature and Causes of the Wealth of Internet Miscreants. In: Conference on Computer and Communications Security, CCS (2007)
-
(2007)
Conference on Computer and Communications Security
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
11
-
-
70350414372
-
-
Gajek, S., Sadeghi, A.-R.: A Forensic Framework for Tracing Phishers. In: IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden (August 2007)
-
Gajek, S., Sadeghi, A.-R.: A Forensic Framework for Tracing Phishers. In: IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden (August 2007)
-
-
-
-
12
-
-
70350410066
-
-
Herley, C., Florencio, D.: How To Login From an Internet Cafe Without Worrying About Keyloggers. In: Symposium on Usable Privacy and Security, SOUPS (2006)
-
Herley, C., Florencio, D.: How To Login From an Internet Cafe Without Worrying About Keyloggers. In: Symposium on Usable Privacy and Security, SOUPS (2006)
-
-
-
-
13
-
-
70350402262
-
Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
-
Technical Report TR-2008-006, University of Mannheim
-
Holz, T., Engelberth, M., Freiling, F.: Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. Technical Report TR-2008-006, University of Mannheim (2008)
-
(2008)
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
14
-
-
70449690094
-
-
Internet Crime Complaint Center IC3, March
-
Internet Crime Complaint Center (IC3). 2008 Internet Crime Report (March 2009), http://www.ic3.gov/media/annualreports.aspx
-
(2008)
Internet Crime Report
-
-
-
15
-
-
70349272437
-
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
-
CCS
-
Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In: Conference on Computer and Communications Security, CCS (2008)
-
(2008)
Conference on Computer and Communications Security
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
16
-
-
85077680022
-
Behavior-based Spyware Detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based Spyware Detection. In: USENIX Security Symposium (2006)
-
(2006)
USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
18
-
-
70350393786
-
-
August 2008
-
MaxMind LLC. MaxMind GeoIP (August 2008), http://www.maxmind.com/app/ip- location
-
GeoIP
-
-
-
19
-
-
51849127252
-
Computer for Verifying
-
Numbers August, U.S. Patent 2,950,048
-
Luhn, H.P.: Computer for Verifying Numbers (August 1960) U.S. Patent 2,950,048
-
(1960)
-
-
Luhn, H.P.1
-
20
-
-
70350423437
-
The underground economy: Priceless
-
December
-
Martin, J., Thomas, R.: The underground economy: priceless. USENIX; login: 31(6) (December 2006)
-
(2006)
USENIX; login
, vol.31
, Issue.6
-
-
Martin, J.1
Thomas, R.2
-
22
-
-
70350406385
-
-
Microsoft. Protected Storage (Pstore), Microsoft Developer Network (MSDN) (August 2008)
-
Microsoft. Protected Storage (Pstore), Microsoft Developer Network (MSDN) (August 2008)
-
-
-
-
25
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Newsome, J., Song, D.X.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Network and Distributed System Security Symposium, NDSS (2005)
-
(2005)
Network and Distributed System Security Symposium, NDSS
-
-
Newsome, J.1
Song, D.X.2
-
28
-
-
80053650188
-
All Your iFRAMEs Point to Us
-
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All Your iFRAMEs Point to Us. In: USENIX Security Symposium (2008)
-
(2008)
USENIX Security Symposium
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
29
-
-
33750365498
-
Understanding the Network-Level Behavior of Spammers
-
Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. SIGCOMM Comput. Commun. Rev. 36(4), 291-302 (2006)
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
30
-
-
70350431699
-
-
June 2007
-
SecureWorks. PRG Trojan (June 2007), http://www.secureworks.com/research/ threats/prgtrojan/
-
Trojan
-
-
-
31
-
-
70350402263
-
-
August
-
SecureWorks. Coreflood Report (August. 2008), http://www.secureworks.com/ research/threats/coreflood-report/
-
(2008)
Coreflood Report
-
-
-
33
-
-
70350376101
-
-
Symantec: Global Internet Security Threat Report: Trends for July - December 07 (April 2008)
-
Symantec: Global Internet Security Threat Report: Trends for July - December 07 (April 2008)
-
-
-
-
35
-
-
84904114872
-
PRECIP: Towards Practical and Retrofittable Confidential Information Protection
-
Wang, X., Li, Z., Li, N., Cho, J.Y.: PRECIP: Towards Practical and Retrofittable Confidential Information Protection. In: Network and Distributed System Security Symposium, NDSS (2008)
-
(2008)
Network and Distributed System Security Symposium, NDSS
-
-
Wang, X.1
Li, Z.2
Li, N.3
Cho, J.Y.4
-
36
-
-
84904088330
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: Network and Distributed System Security Symposium, NDSS (2006)
-
(2006)
Network and Distributed System Security Symposium, NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
37
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy Magazine 5(2), 32-39 (2007)
-
(2007)
IEEE Security & Privacy Magazine
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
38
-
-
77950788046
-
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
-
CCS
-
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In: Conference on Computer and Communications Security, CCS (2007)
-
(2007)
Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|