메뉴 건너뛰기




Volumn 11, Issue 1, 2013, Pages 54-61

Targeted cyberattacks: A superset of advanced persistent threats

Author keywords

advanced persistent threats; cyber warfare; cybercrime; targeted attacks

Indexed keywords

ADVANCED PERSISTENT THREATS; CYBER WARFARE; CYBER-ATTACKS; CYBERCRIME; ECONOMIC MODELS; TARGETED ATTACKS;

EID: 84873369793     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2012.90     Document Type: Article
Times cited : (160)

References (15)
  • 1
    • 84855859636 scopus 로고    scopus 로고
    • Evidence of advanced persistent threat: A case study of malware for political espionage
    • IEEE
    • F. Li, A. Lai, and D. Ddl, "Evidence of Advanced Persistent Threat: A Case Study of Malware for Political Espionage," 6th Int'l Conf. Malicious and Unwanted Software (Malware 11), IEEE, 2011, pp. 102-109.
    • (2011) 6th Int'l Conf. Malicious and Unwanted Software (Malware 11) , pp. 102-109
    • Li, F.1    Lai, A.2    Ddl, D.3
  • 2
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious javascript code
    • ACM
    • M. Cova, C. Kruegel, and G. Vigna, "Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code," Proc. 19th Int'l Conf. World Wide Web, ACM, 2012; http://doi.acm.org/10.1145/1772690.1772720.
    • (2012) Proc. 19th Int'l Conf. World Wide Web
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 3
    • 84873344067 scopus 로고    scopus 로고
    • Browser exploit packs - Death by bundled exploits
    • A.K Sood and R.J. Enbody, "Browser Exploit Packs - Death by Bundled Exploits," Proc. 21st Virus Bulletin Conf., 2011; http://secniche.blogspot. com/2011/10/virus-bulletin-2011-conference-browser.html.
    • (2011) Proc. 21st Virus Bulletin Conf.
    • Sood, A.K.1    Enbody, R.J.2
  • 4
    • 84873342212 scopus 로고    scopus 로고
    • Into the darkness: Dissecting targeted attacks
    • Nov.
    • R. Branco, "Into the Darkness: Dissecting Targeted Attacks," Qualys Blog, Nov. 2011; https://community.qualys.com/blogs/securitylabs/2011/11/ 30/dissecting-targeted-attacks.
    • (2011) Qualys Blog
    • Branco, R.1
  • 5
    • 84863590115 scopus 로고    scopus 로고
    • A security analysis of amazon's elastic compute cloud service
    • ACM
    • M. Balduzzi et al., "A Security Analysis of Amazon's Elastic Compute Cloud Service," Proc. 27th Ann. ACM Symp. Applied Computing, ACM, 2012; http://doi.acm.org/10.1145/2245276.2232005.
    • (2012) Proc. 27th Ann. ACM Symp. Applied Computing
    • Balduzzi, M.1
  • 7
    • 78549259165 scopus 로고    scopus 로고
    • On the analysis of the zeus botnet crimeware toolkit
    • IEEE
    • H. Binsallee et al., "On the Analysis of the Zeus Botnet Crimeware Toolkit," IEEE 8th Ann. Conf. Privacy, Security and Trust (PST), IEEE, 2010; http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber= 5593240&isnumber=5593224.
    • (2010) IEEE 8th Ann. Conf. Privacy, Security and Trust (PST)
    • Binsallee, H.1
  • 9
    • 84927922719 scopus 로고    scopus 로고
    • Achieving cyber survivability in a contested environment using a cyber moving target
    • May
    • H. Okhravi, J.W. Haines, and K. Ingols, "Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target," High Frontier: The Journal for Space and Cyberspace Professionals, May 2011; http://web.mit.edu/ha22286/www/papers/journal/Achieving-Cyber-Survivability-in- a-Contested-Environment-Using-a-Cyber-Moving-Target.pdf.
    • (2011) High Frontier: The Journal for Space and Cyberspace Professionals
    • Okhravi, H.1    Haines, J.W.2    Ingols, K.3
  • 10
    • 84873340257 scopus 로고    scopus 로고
    • School of Public Policy, Univ. of Maryland, Mar.
    • N. Christin, "On Critical Infrastructure Protection and International Agreements," School of Public Policy, Univ. of Maryland, Mar. 2011; www.cissm.umd.edu/papers/files/on-critical-infrastructure-protection-and- international-agreements-033111-final.pdf.
    • (2011) On Critical Infrastructure Protection and International Agreements
    • Christin, N.1
  • 11
    • 84873338401 scopus 로고    scopus 로고
    • Mass meshing injection: Sidename.js (now cssminibar.js) ongoing
    • 15 June
    • W. Huang, C. Hsiao, and N. Lin, "Mass Meshing Injection: Sidename.js (now cssminibar.js) Ongoing," Armorize Malware Blog, 15 June 2011; http://blog.armorize.com/2011/06/mass-meshing-injection-sidenamejs.html.
    • (2011) Armorize Malware Blog
    • Huang, W.1    Hsiao, C.2    Lin, N.3
  • 12
    • 84873338401 scopus 로고    scopus 로고
    • Malvertising on google doubleclick ongoing
    • 25 Aug.
    • W. Huang, C. Hsiao, and N. Lin, "Malvertising on Google Doubleclick Ongoing," Armorize Malware Blog, 25 Aug. 2011; http://blog.armorize.com/ 2011/08/malvertisingon-google-doubleclick.html.
    • (2011) Armorize Malware Blog
    • Huang, W.1    Hsiao, C.2    Lin, N.3
  • 13
    • 84873371573 scopus 로고    scopus 로고
    • Exploiting smart-phone USB connectivity for fun and profit
    • A. Stavrou and Z. Wang, "Exploiting Smart-Phone USB Connectivity for Fun and Profit," BlackHat DC Conf., 2011; https://media.blackhat.com/bh- dc-11/Stavrou-Wang/BlackHat-DC-2011-Stavrou-Zhaohui-USB-exploits-wp.pdf.
    • (2011) BlackHat DC Conf.
    • Stavrou, A.1    Wang, Z.2
  • 14
    • 84873338158 scopus 로고    scopus 로고
    • Thoughts about trusted computing
    • J. Rutkowska, "Thoughts about Trusted Computing," EuSecWest Conf., 2009; http://invisiblethingslab.com/resources/misc09/trusted-computing- thoughts.pdf.
    • (2009) EuSecWest Conf.
    • Rutkowska, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.