-
1
-
-
84870634401
-
-
Adblock plus. http://adblockplus.org/en/.
-
Adblock Plus
-
-
-
4
-
-
84860858567
-
-
Adobe. Adobe flash platform. http://www.adobe.com/flashplatform, 2011.
-
(2011)
Adobe Flash Platform
-
-
-
5
-
-
85022919385
-
Class-based n-gram models of natural language
-
P. F. Brown, P. V. deSouza, R. L. Mercer, V. J. D. Pietra, and J. C. Lai. Class-based n-gram models of natural language. Computational Linguistics, 18:467-479, 1992.
-
(1992)
Computational Linguistics
, vol.18
, pp. 467-479
-
-
Brown, P.F.1
Desouza, P.V.2
Mercer, R.L.3
Pietra, V.J.D.4
Lai, J.C.5
-
6
-
-
85076777802
-
SplitScreen: Enabling efficient, distributed malware detection
-
Berkeley, CA, USA, USENIX Association
-
S. K. Cha, I. Moraru, J. Jang, J. Truelove, D. Brumley, and D. G. Andersen. SplitScreen: enabling efficient, distributed malware detection. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI'10, page 25, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10
, pp. 25
-
-
Cha, S.K.1
Moraru, I.2
Jang, J.3
Truelove, J.4
Brumley, D.5
Andersen, D.G.6
-
7
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
New York, NY, USA, ACM
-
M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious javascript code. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 281-290, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web, WWW '10
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
8
-
-
84870652086
-
-
D. Crockford. Adsafe. http://www.adsafe.org.
-
-
-
Crockford, D.1
-
10
-
-
85180542459
-
Preventing capability leaks in secure javascript subsets
-
The Internet Society
-
M. Finifter, J. Weinberger, and A. Barth. Preventing capability leaks in secure javascript subsets. In NDSS. The Internet Society, 2010.
-
(2010)
NDSS
-
-
Finifter, M.1
Weinberger, J.2
Barth, A.3
-
12
-
-
77950809482
-
Analyzing and detecting malicious flash advertisements
-
S. Ford, M. Cova, C. Kruegel, and G. Vigna. Analyzing and detecting malicious flash advertisements. Computer Security Applications Conference, Annual, 0:363-372, 2009.
-
(2009)
Computer Security Applications Conference Annual
, pp. 363-372
-
-
Ford, S.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
15
-
-
85041447270
-
Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine
-
Berkeley, CA, USA, USENIX Association
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting spammers with snare: spatio-temporal network-level automatic reputation engine. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 101-118, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09
, pp. 101-118
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
16
-
-
85076487784
-
DESEO: Combating search-result poisoning
-
Berkeley, CA, USA, USENIX Association
-
J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deseo: combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 20-20, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 20-20
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
18
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
IEEE, May
-
K. Levchenko, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of 32nd annual Symposium on Security and Privacy. IEEE, May 2011.
-
(2011)
Proceedings of 32nd Annual Symposium on Security and Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
19
-
-
84907402135
-
Adjail: Practical enforcement of confidentiality and integrity policies on web advertisements
-
Berkeley, CA, USA, USENIX Association
-
M. T. Louw, K. T. Ganesh, and V. N. Venkatakrishnan. Adjail: practical enforcement of confidentiality and integrity policies on web advertisements. In Proceedings of the 19th USENIX conference on Security, USENIX Security'10, pages 24-24, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security'10
, pp. 24-24
-
-
Louw, M.T.1
Ganesh, K.T.2
Venkatakrishnan, V.N.3
-
20
-
-
80755169472
-
Surf: Detecting and measuring search poisoning
-
New York, NY, USA, ACM
-
L. Lu, R. Perdisci, and W. Lee. Surf: detecting and measuring search poisoning. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 467-476, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 467-476
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
21
-
-
78650002259
-
Blade: An attack-agnostic approach for preventing drive-by malware infections
-
New York, NY, USA, ACM
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malware infections. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 440-450, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 440-450
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
22
-
-
84870638166
-
-
McAfee. Mcafee web gateway. http://www.mcafee.com/us/products/webgateway. aspx#vtab-Benefits, 2011.
-
(2011)
Mcafee Web Gateway
-
-
-
23
-
-
79959947618
-
What's clicking what? techniques and innovations of today's clickbots
-
Berlin, Heidelberg, Springer-Verlag
-
B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. What's clicking what? techniques and innovations of today's clickbots. In Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment, DIMVA'11, pages 164-183, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'11
, pp. 164-183
-
-
Miller, B.1
Pearce, P.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
-
24
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In In Proceeding of the Network and Distributed System Security Symposium (NDSS'07), 2007.
-
(2007)
Proceeding of the Network and Distributed System Security Symposium (NDSS'07)
-
-
Nentwich, F.1
Jovanovic, N.2
Kirda, E.3
Kruegel, C.4
Vigna, G.5
-
25
-
-
84870646492
-
-
A. NS
-
A. NS. Blackhole exploit kit 1.0.2. http://www.airdemon.net/blackhole. html, 2011.
-
(2011)
Blackhole Exploit Kit 1.0.2
-
-
-
27
-
-
80053650188
-
All your iframes point to us
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Proceedings of the 17th conference on Security symposium, pages 1-15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
28
-
-
82955165652
-
Understanding fraudulent activities in online ad exchanges
-
B. Stone-Gross, R. Stevens, R. Kemmerer, C. Kruegel, G. Vigna, and A. Zarras. Understanding fraudulent activities in online ad exchanges. In Proceedings of Internet Measurement Conference, IMC '11, 2011.
-
(2011)
Proceedings of Internet Measurement Conference, IMC '11
-
-
Stone-Gross, B.1
Stevens, R.2
Kemmerer, R.3
Kruegel, C.4
Vigna, G.5
Zarras, A.6
-
30
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
Washington, DC, USA, IEEE Computer Society
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time url spam filtering service. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, pages 447-462, Washington, DC, USA, 2011. IEEE Computer Society.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11
, pp. 447-462
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
31
-
-
84870644809
-
-
TrendLabs., March
-
TrendLabs. Follow the money trail. http://blog.trendmicro.com/follow- themoney-trail/, March 2012.
-
(2012)
Follow the Money Trail
-
-
-
33
-
-
80051907649
-
Understanding the network and user-targeting properties of web advertising networks
-
Y. Wang, D. Burgener, A. Kuzmanovic, and M.-F. Gabriel. Understanding the network and user-targeting properties of web advertising networks. In ICDCS, pages 613-622, 2011.
-
(2011)
ICDCS
, pp. 613-622
-
-
Wang, Y.1
Burgener, D.2
Kuzmanovic, A.3
Gabriel, M.-F.4
-
35
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
New York, NY, USA, ACM
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. In Proceedings of the ACM SIGCOMM 2008 conference on Data communication, SIGCOMM '08, pages 171-182, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM '08
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
37
-
-
84869441116
-
Arrow: Generating signatures to detect drive-by downloads
-
New York, NY, USA, ACM
-
J. Zhang, C. Seifert, J. W. Stokes, and W. Lee. Arrow: Generating signatures to detect drive-by downloads. In Proceedings of the 20th international conference on World wide web, WWW '11, pages 187-196, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 20th International Conference on World Wide Web, WWW '11
, pp. 187-196
-
-
Zhang, J.1
Seifert, C.2
Stokes, J.W.3
Lee, W.4
|