-
1
-
-
84872102454
-
-
Capture-HPC. https://projects.honeynet.org/capture-hpc.
-
Capture-HPC
-
-
-
5
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The nepenthes platform: An efficient approach to collect malware. Lecture Notes in Computer Science, vol. 4219:165, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4219
, pp. 165
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
9
-
-
77950809482
-
Analyzing and detecting malicious ash advertisements
-
S. Ford, M. Cova, C. Kruegel, and G. Vigna. Analyzing and detecting malicious ash advertisements. In 2009 Annual Computer Security Applications Conference, pages 363-372, 2009.
-
(2009)
2009 Annual Computer Security Applications Conference
, pp. 363-372
-
-
Ford, S.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
13
-
-
80053650188
-
All your iFRAMEs point to us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iFRAMEs point to us. In Proceedings of the 17th USENIX Security Symposium, pages 1-15, 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
14
-
-
50049093680
-
The ghost in the browser
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost In The Browser. In First Workshop on Hot Topics in Understanding Botnets, 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets
-
-
Provos, N.1
Mcnamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
15
-
-
84870788291
-
Measurement study on malicious web servers in the. Nz domain
-
C. Seifert, V. Delwadia, P. Komisarczuk, D. Stirling, and I. Welch. Measurement Study on Malicious Web Servers in the. nz Domain. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, page 25, 2009.
-
(2009)
Proceedings of the 14th Australasian Conference on Information Security and Privacy
, pp. 25
-
-
Seifert, C.1
Delwadia, V.2
Komisarczuk, P.3
Stirling, D.4
Welch, I.5
-
16
-
-
77954497121
-
Preventing drive-by download via inter-module communication monitoring
-
C. Song, J. Zhuge, X. Han, and Z. Ye. Preventing drive-by download via inter-module communication monitoring. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 124-134, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 124-134
-
-
Song, C.1
Zhuge, J.2
Han, X.3
Ye, Z.4
-
17
-
-
84911909981
-
-
W3C. XMLHttpRequest. http://www.w3.org/TR/XMLHttpRequest/.
-
XMLHttpRequest
-
-
-
18
-
-
79956039308
-
Strider HoneyMonkeys: Active Client-Side honeypots for finding web sites that exploit browser vulnerabilities
-
Y. M. Wang. Strider HoneyMonkeys: active Client-Side honeypots for finding web sites that exploit browser vulnerabilities. In Part of Works in Progress at the 14th USENIX Security Symposium, 2007.
-
(2007)
Part of Works in Progress at the 14th USENIX Security Symposium
-
-
Wang, Y.M.1
-
19
-
-
38149135738
-
Collecting autonomous spreading malware using high-interaction honeypots
-
J. Zhuge, T. Holz, X. Han, C. Song, and W. Zou. Collecting autonomous spreading malware using high-interaction honeypots. Lecture Notes In Computer Science, vol. 4861:438, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4861
, pp. 438
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Song, C.4
Zou, W.5
-
20
-
-
77950621688
-
Studying malicious websites and the underground economy on the chinese web
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economy on the chinese web. In Proceedings of the 7th Workshop on the Economics of Information Security, 2007.
-
(2007)
Proceedings of the 7th Workshop on the Economics of Information Security
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|