메뉴 건너뛰기




Volumn , Issue , 2010, Pages 124-134

Preventing drive-by download via inter-module communication monitoring

Author keywords

ActiveX; drive by download; inter module communication; intrusion detection; malicious script

Indexed keywords

ACTIVEX; DISTRIBUTED DENIAL OF SERVICE ATTACK; FALSE POSITIVE; INTER-MODULE COMMUNICATION; INTERNET EXPLORERS; INTERNET USERS; MALWARES; MICROSOFT; PERFORMANCE PENALTIES; PERSONAL IDENTIFICATION; PHISHING; PLUG-INS; PROTOTYPE SYSTEM; TEST SETS;

EID: 77954497121     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755705     Document Type: Conference Paper
Times cited : (21)

References (49)
  • 2
    • 77954467828 scopus 로고    scopus 로고
    • L. Beijing Rising International Software Co. h1. November
    • L. Beijing Rising International Software Co. Internet security report for china mainland, 2009 h1. http://it.rising.com.cn/new2008/News/NewsInfo/2009-07- 21/1248160663d53890.shtml, November 2008.
    • (2008) Internet Security Report for China Mainland, 2009 H1
  • 3
    • 49949119476 scopus 로고    scopus 로고
    • XSS-GUARD: Precise dynamic prevention of cross-site scripting attacks
    • Detection of Intrusions and Malware, and Vulnerability Assessment, Springer Berlin / Heidelberg
    • P. Bisht and V. N. Venkatakrishnan. XSS-GUARD: Precise dynamic prevention of cross-site scripting attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 23-43. Springer Berlin / Heidelberg, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5137 , pp. 23-43
    • Bisht, P.1    Venkatakrishnan, V.N.2
  • 6
    • 34548717095 scopus 로고    scopus 로고
    • Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
    • Washington, DC, USA, IEEE Computer Society
    • W. Cui, M. Peinado, H. J. Wang, and M. E. Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 252-266, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy , pp. 252-266
    • Cui, W.1    Peinado, M.2    Wang, H.J.3    Locasto, M.E.4
  • 18
    • 84874905168 scopus 로고    scopus 로고
    • G. Inc.
    • G. Inc. Google safe browsing api. http://code.google.com/apis/ safebrowsing/.
    • Google Safe Browsing Api
  • 20
    • 77954477598 scopus 로고    scopus 로고
    • U. C. S. Lab.
    • U. C. S. Lab. Wepawet. http://wepawet.iseclab.org/.
    • Wepawet
  • 25
    • 84871349041 scopus 로고    scopus 로고
    • Automatically hardening web applications using precise tainting
    • Security and Privacy in the Age of Ubiquitous Computing, Springer Boston
    • A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Security and Privacy in the Age of Ubiquitous Computing, volume 181 of IFIP International Federation for Information Processing, pages 295-307. Springer Boston, 2005.
    • (2005) IFIP International Federation for Information Processing , vol.181 , pp. 295-307
    • Nguyen-Tuong, A.1    Guarnieri, S.2    Greene, D.3    Shirley, J.4    Evans, D.5
  • 26
    • 33745661661 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
    • T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Recent Advances in Intrusion Detection, volume 3858 of Lecture Notes in Computer Science, pages 124-145. Springer Berlin / Heidelberg, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3858 , pp. 124-145
    • Pietraszek, T.1    Berghe, C.V.2
  • 27
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 28
    • 38149093160 scopus 로고    scopus 로고
    • Emulation-based detection of non-self-contained polymorphic shellcode
    • Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
    • M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos. Emulation-based detection of non-self-contained polymorphic shellcode. In Recent Advances in Intrusion Detection, volume 4637 of Lecture Notes in Computer Science, pages 87-106. Springer Berlin / Heidelberg, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4637 , pp. 87-106
    • Polychronakis, M.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 34
    • 34848907433 scopus 로고    scopus 로고
    • Browsershield: Vulnerability-driven filtering of dynamic html
    • C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir. Browsershield: Vulnerability-driven filtering of dynamic html. ACM Trans. Web, 1(3):11, 2007.
    • (2007) ACM Trans. Web , vol.1 , Issue.3 , pp. 11
    • Reis, C.1    Dunagan, J.2    Wang, H.J.3    Dubrovsky, O.4    Esmeir, S.5
  • 35
    • 77954524365 scopus 로고    scopus 로고
    • Secunia. 2008 report. http://secunia.com/gfx/Secunia2008Report.pdf, 2008.
    • (2008) Secunia. 2008 Report
  • 41
    • 84958963167 scopus 로고    scopus 로고
    • Accurate buffer overow detection via abstract pay load execution
    • Recent Advances in Intrusion Detection, Springer Berlin / Heidelberg
    • T. Toth and C. Kruegel. Accurate buffer overow detection via abstract pay load execution. In Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science, pages 274-291. Springer Berlin / Heidelberg, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2516 , pp. 274-291
    • Toth, T.1    Kruegel, C.2
  • 42
  • 44
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Commun. Rev., 34(4):193-204, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.4 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.