-
1
-
-
85080711655
-
The Ghost in the Browser: Analysis of Web-based Malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The Ghost in the Browser: Analysis of Web-based Malware," in USENIX Workshop on Hot Topics in Understanding Botnet, 2007.
-
USENIX Workshop on Hot Topics in Understanding Botnet, 2007
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
2
-
-
80053650188
-
All Your iFrames Point to Us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All Your iFrames Point to Us," in USENIX Security Symposium, 2008.
-
USENIX Security Symposium, 2008
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
4
-
-
85084096558
-
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution
-
M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao, "The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution," in USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010.
-
USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
-
-
Rajab, M.A.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Zhao, X.5
-
5
-
-
79958723522
-
An Analysis of Rogue AV Campaigns
-
M. Cova, C. Leita, O. Thonnard, A. Keromytis, and M. Dacier, "An Analysis of Rogue AV Campaigns," in Symposium on Recent Advances in Intrusion Detection (RAID), 2010.
-
Symposium on Recent Advances in Intrusion Detection (RAID), 2010
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
9
-
-
33750356750
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King, "Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities," in Symposium on Network and Distributed System Security (NDSS), 2006.
-
Symposium on Network and Distributed System Security (NDSS), 2006
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
12
-
-
85042130640
-
Searching the Searchers with SearchAudit
-
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy, "Searching the Searchers with SearchAudit," in USENIX Security Symposium, 2010.
-
USENIX Security Symposium, 2010
-
-
John, J.1
Yu, F.2
Xie, Y.3
Abadi, M.4
Krishnamurthy, A.5
-
15
-
-
78651523935
-
To Catch A Predator: A Natural Language Approach for Eliciting Malicious Payloads
-
S. Small, J. Mason, F. Monrose, N. Provos, and A. Stubblefield, "To Catch A Predator: A Natural Language Approach for Eliciting Malicious Payloads," in USENIX Security Symposium, 2008.
-
USENIX Security Symposium, 2008
-
-
Small, S.1
Mason, J.2
Monrose, F.3
Provos, N.4
Stubblefield, A.5
-
16
-
-
85175133074
-
-
Google, "Safe Browsing API," http://goo.gl/vIYfk, 2011.
-
(2011)
Safe Browsing API
-
-
-
17
-
-
85084096382
-
WebCop: Locating Neighborhoods of Malware on the Web
-
J. Stokes, R. Andersen, C. Seifert, and K. Chellapilla, "WebCop: Locating Neighborhoods of Malware on the Web," in USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010.
-
USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
-
-
Stokes, J.1
Andersen, R.2
Seifert, C.3
Chellapilla, K.4
-
20
-
-
85175130870
-
Cult of the Dead Cow
-
Cult of the Dead Cow, "Goolag Scanner," http://goo.gl/lBK1o.
-
Goolag Scanner
-
-
-
21
-
-
84873447654
-
A fast filter for the large-scale detection of malicious web pages
-
D. Canali, M. Cova, C. Kruegel, and G. Vigna, "A fast filter for the large-scale detection of malicious web pages," in International World Wide Web Conference (WWW), 2011.
-
International World Wide Web Conference (WWW), 2011
-
-
Canali, D.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
22
-
-
80155141906
-
-
Microsoft Research, Tech. Rep.
-
C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, "Zozzle: Low-overhead Mostly Static JavaScript Malware Detection," Microsoft Research, Tech. Rep., 2010.
-
(2010)
Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
33
-
-
77950809482
-
Analyzing and Detecting Malicious Flash Advertisements
-
S. Ford, M. Cova, C. Kruegel, and G. Vigna, "Analyzing and Detecting Malicious Flash Advertisements," in Annual Computer Security Applications Conference (ACSAC), 2009.
-
Annual Computer Security Applications Conference (ACSAC), 2009
-
-
Ford, S.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
34
-
-
85076893377
-
SpyProxy: Execution-based Detection of Malicious Web Content
-
A. Moshchuk, T. Bragin, D. Deville, S. Gribble, and H. Levy, "SpyProxy: Execution-based Detection of Malicious Web Content," in USENIX Security Symposium, 2007.
-
USENIX Security Symposium, 2007
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.4
Levy, H.5
-
35
-
-
40249106140
-
A Crawler-based Study of Spyware in the Web
-
A. Moshchuk, T. Bragin, S. Gribble, and H. Levy, "A Crawler-based Study of Spyware in the Web," in Symposium on Network and Distributed System Security (NDSS), 2006.
-
Symposium on Network and Distributed System Security (NDSS), 2006
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.3
Levy, H.4
-
36
-
-
85175129976
-
Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript
-
B. Feinstein and D. Peck, "Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript," in Black Hat Security Conference, 2007.
-
Black Hat Security Conference, 2007
-
-
Feinstein, B.1
Peck, D.2
-
39
-
-
84869772992
-
Defending Browsers against Drive-by Downloads: Mitigating Heapspraying Code Injection Attacks
-
M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda, "Defending Browsers against Drive-by Downloads: Mitigating Heapspraying Code Injection Attacks," in Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2009.
-
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2009
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
40
-
-
85175132514
-
Jsunpack: A Solution to Decode JavaScript Exploits as they Rapidly Evolve
-
B. Hartstein, "Jsunpack: A Solution to Decode JavaScript Exploits as they Rapidly Evolve," in ShmooCon Conference, 2009.
-
ShmooCon Conference, 2009
-
-
Hartstein, B.1
-
41
-
-
84945575427
-
The Ultimate Deobfuscator
-
S. Chenette, "The Ultimate Deobfuscator," in ToorCon, 2008.
-
(2008)
ToorCon
-
-
Chenette, S.1
-
42
-
-
78650002259
-
BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee, "BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections," in ACM Conference on Computer and Communications Security (CCS), 2010.
-
ACM Conference on Computer and Communications Security (CCS), 2010
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
43
-
-
84869441116
-
ARROW: Generating Signatures to Detect Drive-By Downloads
-
J. Zhang, C. Seifert, J. Stokes, and W. Lee, "ARROW: Generating Signatures to Detect Drive-By Downloads," in International World Wide Web Conference (WWW), 2011.
-
International World Wide Web Conference (WWW), 2011
-
-
Zhang, J.1
Seifert, C.2
Stokes, J.3
Lee, W.4
-
45
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. Reddy, A. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Conference on Internet Measurement (IMC), 2010.
-
Conference on Internet Measurement (IMC), 2010
-
-
Yadav, S.1
Reddy, A.K.2
Reddy, A.3
Ranjan, S.4
-
46
-
-
84879219725
-
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
-
L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, "EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis," in Symposium on Network and Distributed System Security (NDSS), 2011.
-
Symposium on Network and Distributed System Security (NDSS), 2011
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
|