메뉴 건너뛰기




Volumn 44 CCIS, Issue , 2009, Pages 110-118

Devious Chatbots - Interactive malware with a plot

Author keywords

[No Author keywords available]

Indexed keywords

CHATBOTS; CONVERSATION AGENTS; HUMAN COMMUNICATIONS; MALWARES; NEW FORMS; ONLINE HELP; PRACTICAL USE; SOCIAL ENGINEERING; SOCIAL ROBOTS; WEB 2.0;

EID: 78349246329     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-03986-7_13     Document Type: Conference Paper
Times cited : (7)

References (45)
  • 1
    • 78349249253 scopus 로고    scopus 로고
    • December 8 (Accessed January 30, 2009)
    • Carr, N.: Slutbot aces Turing Test*, December 8 (2007), http://www.roughtype.com/archives/2007/12/slutbot-passes.php (Accessed January 30, 2009)
    • (2007) Slutbot Aces Turing Test*
    • Carr, N.1
  • 4
    • 78349254064 scopus 로고    scopus 로고
    • F-Secure, May 7 (accessed January 30, 2009)
    • F-Secure, Virus Descriptions: Kickin, F-Secure, May 7 (2003), http://www.f-secure.com/v-descs/kickin.shtml (accessed January 30, 2009)
    • (2003) Virus Descriptions: Kickin
  • 5
    • 78349267410 scopus 로고    scopus 로고
    • Scientific American Mind, January 1 (accessed January 30, 2009)
    • Baetiong, F.: 'Classmates Reunion' Used as Malware Ploy., Scientific American Mind, January 1 (2009), http://blog.trendmicro.com/classmates-reunion- used-as-malware-ploy/ (accessed January 30, 2009)
    • (2009) 'Classmates Reunion' Used As Malware Ploy
    • Baetiong, F.1
  • 6
    • 78349291371 scopus 로고    scopus 로고
    • Computerworld Australia, December 15 (accessed January 30, 2009)
    • Rossi, S.: Beware the CyberLover that Steals Personal Data. Computerworld Australia, December 15 (2007), http://www.pcworld.com/printable/article/id, 140507/printable.html (accessed January 30, 2009)
    • (2007) Beware the CyberLover That Steals Personal Data
    • Rossi, S.1
  • 7
    • 78349261057 scopus 로고    scopus 로고
    • Viruslist.com, July 13 (accessed January 30, 2009)
    • Schouwenberg, R.: Death of the IM-Worm? Viruslist.com, July 13 (2006), http://www.viruslist.com/en/analysis?pubid=191386185 (accessed January 30, 2009)
    • (2006) Death of the IM-Worm?
    • Schouwenberg, R.1
  • 9
    • 78349253281 scopus 로고    scopus 로고
    • Facebook Gets Friended by Malware
    • August 26 (accessed Feburary 2, 2009)
    • Helft, M.: Facebook Gets Friended by Malware, The New York Times, August 26 (2008), http://bits.blogs.nytimes.com/2008/08/26/facebook-gets-friended-by- malware/ (accessed Feburary 2, 2009)
    • (2008) The New York Times
    • Helft, M.1
  • 10
    • 78349255208 scopus 로고    scopus 로고
    • Kaspersky Lab, July 31 (accessed Feburary 2, 2009)
    • Kaspersky Lab, Kaspersky Lab Detects New Worms Attacking MySpace and Facebook, Kaspersky Lab, July 31 (2008), http://www.kaspersky.com/news?id= 207575670 (accessed Feburary 2, 2009)
    • (2008) Kaspersky Lab Detects New Worms Attacking MySpace and Facebook
  • 13
    • 78349231851 scopus 로고    scopus 로고
    • PandaLabs' 2009 Predictions: Malware Will Increas
    • PandaLab, December 21 (accessed Feburary 2, 2009)
    • PandaLab, PandaLabs' 2009 Predictions: Malware Will Increas. In: 2009, PandaLab, December 21 (2008), http://www.prweb.com/releases/2008/12/ prweb1772314.htm (accessed Feburary 2, 2009)
    • (2008) 2009, PandaLab
  • 14
    • 78349278270 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA), European Network and Information Security Agency
    • European Network and Information Security Agency (ENISA), Position Paper - Web 2.0 Security and Privacy. European Network and Information Security Agency (2008)
    • (2008) Position Paper - Web 2.0 Security and Privacy
  • 15
    • 78349246593 scopus 로고    scopus 로고
    • Malicious Threats and Vulnerabilities in Instant Messaging
    • Hindocha, N., Chien, E.: Malicious Threats and Vulnerabilities in Instant Messaging. Symantec Security response (2003)
    • (2003) Symantec Security Response
    • Hindocha, N.1    Chien, E.2
  • 17
    • 78349299643 scopus 로고    scopus 로고
    • National Infrastructure Security Coordination Centre (NISCC), National Infrastructure Security Coordination Centre (NISCC), NISCC Briefing 08a/2006
    • National Infrastructure Security Coordination Centre (NISCC), Social engineering against information systems: what is it and how do you protect yourself?, National Infrastructure Security Coordination Centre (NISCC), NISCC Briefing 08a/2006 (2006)
    • (2006) Social Engineering Against Information Systems: What Is It and How Do You Protect Yourself?
  • 18
    • 78349240248 scopus 로고    scopus 로고
    • Malware gets up close and personal
    • Feburary 22 (accessed Feburary 2, 2009)
    • Nichols, S.: Malware gets up close and personal. IT News Australia, Feburary 22 (2008), http://www.itnews.com.au/News/70615,malware-gets-up-close- and-personal.aspx (accessed Feburary 2, 2009)
    • (2008) IT News Australia
    • Nichols, S.1
  • 20
    • 78349288295 scopus 로고    scopus 로고
    • McAfee Avert Labs, McAfee Avert Labs
    • McAfee Avert Labs, Localized Malware Takes Root. McAfee Avert Labs (2008)
    • (2008) Localized Malware Takes Root
  • 21
    • 78349278672 scopus 로고    scopus 로고
    • Forbes.com, November 25 (accessed on Feburary 2 2009)
    • Greenberg, A.: Robots In Disguise. Forbes.com, November 25 (2008), http://www.forbes.com/2008/11/25/cyber-security-bots-tech-identity08-cx-ag- 1125cyberbots.html (accessed on Feburary 2 2009)
    • (2008) Robots in Disguise
    • Greenberg, A.1
  • 22
    • 78349274236 scopus 로고    scopus 로고
    • Microsoft Says Recovery from Malware Becoming Impossible
    • April 4
    • Naraine, R.: Microsoft Says Recovery from Malware Becoming Impossible. eWeek, April 4 (2006)
    • (2006) eWeek
    • Naraine, R.1
  • 23
    • 77951728594 scopus 로고    scopus 로고
    • accessed Feburary 4, 2009
    • Strickland, J.: How Web 3.0 Will Work. HowStuffWorks, http://computer.howstuffworks.com/web-30.htm (accessed Feburary 4, 2009)
    • How Web 3.0 Will Work
    • Strickland, J.1
  • 24
    • 78349241634 scopus 로고    scopus 로고
    • The hidden flaws in Web 2.0
    • The Economist, August 8 (accessed Feburary 4, 2009)
    • Nuttall, C.: The hidden flaws in Web 2.0., Global Technology Forum, Economist Intelligence Unit, The Economist, August 8 (2006), http://globaltechforum.eiu.com/index.asp?categoryid=&channelid=&doc-id= 9168&layout=rich-story&search=footing (accessed Feburary 4, 2009)
    • (2006) Global Technology Forum
    • Nuttall, C.1
  • 25
    • 78349282477 scopus 로고    scopus 로고
    • Malicious worm that talks back
    • December 12 (accessed Feburary 4, 2009)
    • Thompson, B.: Malicious worm that talks back. BBC News, December 12 (2005), http://news.bbc.co.uk/2/hi/technology/4520766.stm (accessed Feburary 4, 2009)
    • (2005) BBC News
    • Thompson, B.1
  • 26
    • 78349253661 scopus 로고    scopus 로고
    • Destructive Koobface virus turns up on Facebook
    • December 4 (accessed Feburary 4, 2009)
    • Finkle, J.: Destructive Koobface virus turns up on Facebook. Reuters, December 4 (2008), http://www.reuters.com/article/newsOne/idUSTRE4B37LV20081204 (accessed Feburary 4, 2009)
    • (2008) Reuters
    • Finkle, J.1
  • 29
    • 78349246139 scopus 로고    scopus 로고
    • Firms must be alert to social engineering tricks
    • September 26 (accessed Feburary 7, 2009)
    • Muncaster, P.: Firms must be alert to social engineering tricks. IT Week, September 26 (2007), http://www.vnunet.com/itweek/news/2199635/firms-alert- social-engineering (accessed Feburary 7, 2009)
    • (2007) IT Week
    • Muncaster, P.1
  • 32
    • 0004246220 scopus 로고
    • PhD thesis, University of Southern California
    • Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)
    • (1985) Computer Viruses
    • Cohen, F.1
  • 37
    • 78349265954 scopus 로고    scopus 로고
    • Communication and Operating Systems Group, Berlin University of Technology
    • Youansi, G.N.: Artificial Immune System. Communication and Operating Systems Group, Berlin University of Technology (2006)
    • (2006) Artificial Immune System
    • Youansi, G.N.1
  • 38
    • 35048840752 scopus 로고    scopus 로고
    • Intelligent Agent Technology in E-Commerce
    • Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. Springer, Heidelberg
    • Goh, O.S., Fung, C.C.: Intelligent Agent Technology in E-Commerce. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol. 2690. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2690
    • Goh, O.S.1    Fung, C.C.2
  • 39
    • 78349233338 scopus 로고    scopus 로고
    • Has text-porn finally made computers human
    • Feburary 20 (accessed January 30, 2009)
    • Ward, M.: Has text-porn finally made computers human. BBC News, Feburary 20 (2004), http://news.bbc.co.uk/2/hi/uk-news/magazine/3503465.stm (accessed January 30, 2009)
    • (2004) BBC News
    • Ward, M.1
  • 43
  • 44
    • 78349270733 scopus 로고    scopus 로고
    • Kelvir.EB. (accessed May 17, 2009)
    • SpywareGuide, Kelvir.EB. FaceTime Security Labs, http://www.spywareguide. com/product-show.php?id=3353 (accessed May 17, 2009)
    • FaceTime Security Labs
  • 45
    • 78349296240 scopus 로고    scopus 로고
    • Cyberlover (accessed May 17, 2009)
    • Cyberlover, http://habrahabr.ru/blogs/cyberpunk/17263/ (accessed May 17, 2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.