-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In Proceedings of the Conference on Recent Advances in Intrusion Detection, 2007.
-
(2007)
Proceedings of the Conference on Recent Advances in Intrusion Detection
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
77955038057
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
6
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
April
-
C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song. Insights from the Inside: A View of Botnet Management from Infiltration. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 2010.
-
(2010)
Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
11
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Zhao. Detecting and Characterizing Social Spam Campaigns. In Proceedings of the Internet Measurement Conference (IMC), 2010.
-
(2010)
Proceedings of the Internet Measurement Conference (IMC)
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.6
-
15
-
-
84870640932
-
EvilSeed: A guided approach to finding malicious web pages
-
L. Invernizzi, P. M. Comparetti, S. Benvenuti, C. Kruegel, M. Cova, and G. Vigna. EvilSeed: A Guided Approach to Finding Malicious Web Pages. In IEEE Symposium on Security and Privacy, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Invernizzi, L.1
Comparetti, P.M.2
Benvenuti, S.3
Kruegel, C.4
Cova, M.5
Vigna, G.6
-
19
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look At Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009.
-
(2009)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
20
-
-
82955197334
-
GQ: Practical containment for measuring modern malware systems
-
ACM
-
C. Kreibich, N. Weaver, C. Kanich, W. Cui, and V. Paxson. GQ: Practical Containment for Measuring Modern Malware Systems. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 397-412. ACM, 2011.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 397-412
-
-
Kreibich, C.1
Weaver, N.2
Kanich, C.3
Cui, W.4
Paxson, V.5
-
21
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
IEEE
-
K. Levchenko et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In IEEE Symposium on Security and Privacy, pages 431-446. IEEE, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 431-446
-
-
Levchenko, K.1
-
23
-
-
84870638908
-
-
MalwareIntelligence, October
-
MalwareIntelligence. Inside Phoenix Exploit's Kit 2.8 mini version. http://malwareint.blogspot.com.es/2011/10/insidephoenix-exploits-kit-28-mini. html, October 2011.
-
(2011)
Inside Phoenix Exploit's Kit 2.8 Mini Version
-
-
-
24
-
-
84870641168
-
-
July
-
Malware Domain List. http://www.malwaredomainlist.com, July 2012.
-
(2012)
-
-
-
25
-
-
79959947618
-
What's clicking what? Techniques and innovations of today's clickbots
-
B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. What's Clicking What? Techniques and Innovations of Today's Clickbots. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 164-183, 2011.
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 164-183
-
-
Miller, B.1
Pearce, P.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
-
29
-
-
80053650188
-
All your iFRAMEs point to us
-
July
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFRAMEs Point to Us. In Proceedings of the 17th Usenix Security Symposium, pages 1-15, July 2008.
-
(2008)
Proceedings of the 17th Usenix Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
30
-
-
84860775300
-
Trends in circumventing web-malware detection
-
July
-
M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in Circumventing Web-Malware Detection. Technical report, Google, July 2011.
-
(2011)
Technical Report Google
-
-
Rajab, M.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
31
-
-
85084096558
-
The Nocebo effect on the web: An analysis of fake anti-virus distribution
-
M. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Rajab, M.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Zhao, X.5
-
32
-
-
45749089757
-
Peeking through the cloud: DNS-based estimation and its applications
-
M. Rajab, F. Monrose, A. Terzis, and N. Provos. Peeking Through the Cloud: DNS-Based Estimation and Its Applications. In Applied Cryptography and Network Security, pages 21-38, 2008.
-
(2008)
Applied Cryptography and Network Security
, pp. 21-38
-
-
Rajab, M.1
Monrose, F.2
Terzis, A.3
Provos, N.4
-
33
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and Classification of Malware Behavior. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 108-125, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
36
-
-
79958728571
-
Sandnet: Network traffic analysis of malicious software
-
ACM
-
C. Rossow, C. Dietrich, H. Bos, L. Cavallaro, M. van Steen, F. Freiling, and N. Pohlmann. Sandnet: Network Traffic Analysis of Malicious Software. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pages 78-88. ACM, 2011.
-
(2011)
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
, pp. 78-88
-
-
Rossow, C.1
Dietrich, C.2
Bos, H.3
Cavallaro, L.4
Van Steen, M.5
Freiling, F.6
Pohlmann, N.7
-
37
-
-
84870630352
-
-
May
-
SellMeYourTraffic.com. http://www.sellmeyourtraffic.com, May 2012.
-
(2012)
-
-
-
38
-
-
84870639155
-
-
May
-
URL Query. http://urlquery.net/report.php?id=40035, May 2012.
-
(2012)
-
-
-
39
-
-
84869407868
-
The underground economy of fake antivirus software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security (WEIS), 2011.
-
(2011)
Proceedings of the Workshop on Economics of Information Security (WEIS)
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
40
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of the 16th ACM conference on Computer and communications security, pages 635-647, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
42
-
-
82955165652
-
Understanding fraudulent activities in online ad exchanges
-
B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, and G. Vigna. Understanding Fraudulent Activities in Online Ad Exchanges. In Proceedings of the Internet Measurement Conference (IMC), 2011.
-
(2011)
Proceedings of the Internet Measurement Conference (IMC)
-
-
Stone-Gross, B.1
Stevens, R.2
Zarras, A.3
Kemmerer, R.4
Kruegel, C.5
Vigna, G.6
-
43
-
-
84870643963
-
-
February
-
H. Suri. The BlackHole Theory. http://www.symantec.com/connect/blogs/ blackhole-theory, February 2011.
-
(2011)
The BlackHole Theory
-
-
Suri, H.1
-
46
-
-
84870633431
-
-
Trustwave Spider Labs. May
-
Trustwave Spider Labs. Catch Me If You Can, Trojan Banker Strikes Again. http://blog.spiderlabs.com/2012/05/catch-meif-you-can-trojan-banker-zeus- strikes-again-part-2-of-5-1.html, May 2012.
-
(2012)
Catch Me if You Can, Trojan Banker Strikes Again
-
-
-
47
-
-
33750356750
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), 2006.
-
(2006)
Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
|