-
1
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing internet scam hosting infrastructure. In: USENIX Security (2007)
-
(2007)
USENIX Security
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
79958749593
-
Scalable, behavior-based malware clustering
-
Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS (2009)
-
(2009)
NDSS
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
4
-
-
84869388520
-
Manufacturing compromise: The emergence of exploit-as-a-service
-
Grier, C., et al.: Manufacturing compromise: The emergence of exploit-as-a-service. In: CCS (2012)
-
(2012)
CCS
-
-
Grier, C.1
-
5
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: The commoditization of malware distribution. In: USENIX Security (2011)
-
(2011)
USENIX Security
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
6
-
-
84881180992
-
-
Caida. As ranking (2012), http://as-rank.caida.org
-
(2012)
As Ranking
-
-
-
7
-
-
84893029133
-
The role of web hosting providers in detecting compromised websites
-
Canali, D., Balzarotti, D., Francillon, A.: The role of web hosting providers in detecting compromised websites. In: WWW (2013)
-
(2013)
WWW
-
-
Canali, D.1
Balzarotti, D.2
Francillon, A.3
-
8
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
Cho, C.Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the inside: A view of botnet management from infiltration. In: LEET (2010)
-
(2010)
LEET
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
9
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious javascript code. In: WWW(2010)
-
(2010)
WWW
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
11
-
-
80955172320
-
Zozzle: Low-overhead mostly static javascript malware detection
-
Curtsinger, C., Livshits, B., Zorn, B., Seifert, C.: Zozzle: Low-overhead mostly static javascript malware detection. In: USENIX Security (2011)
-
(2011)
USENIX Security
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
13
-
-
84881125906
-
-
Malicia project, http://malicia-project.com/
-
-
-
-
14
-
-
84941155240
-
Well-separated clusters and optimal fuzzy partitions
-
Dunn, J.C.: Well-separated clusters and optimal fuzzy partitions. Journal of Cybernetics 4(1) (1974)
-
(1974)
Journal of Cybernetics
, vol.4
, Issue.1
-
-
Dunn, J.C.1
-
18
-
-
80755168347
-
Bitshred: Feature hashing malware for scalable triage and semantic analysis
-
Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: CCS (2011)
-
(2011)
CCS
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
19
-
-
85076932663
-
Studying spamming botnets using Botlab
-
John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying spamming botnets using Botlab. In: NSDI (2009)
-
(2009)
NSDI
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
21
-
-
84881179113
-
-
Krawetz, N.: Average perceptual hash (2011), http://www.hackerfactor.com/ blog/index.php?/archives/432-Looks-Like-It.html
-
(2011)
Average Perceptual Hash
-
-
Krawetz, N.1
-
22
-
-
82955197334
-
GQ: Practical containment for measuring modern malware systems
-
Kreibich, C., Weaver, N., Kanich, C., Cui, W., Paxson, V.: GQ: Practical containment for measuring modern malware systems. In: IMC (2011)
-
(2011)
IMC
-
-
Kreibich, C.1
Weaver, N.2
Kanich, C.3
Cui, W.4
Paxson, V.5
-
23
-
-
84881149239
-
-
Love vps, http://www.lovevps.com/
-
-
-
-
24
-
-
84881186378
-
-
Malware domain list, http://malwaredomainlist.com/
-
-
-
-
26
-
-
40249106140
-
A crawler-based study of spyware on the web
-
Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A crawler-based study of spyware on the web. In: NDSS (2006)
-
(2006)
NDSS
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
28
-
-
84881155041
-
-
Ssdsandbox, http://xml.ssdsandbox.net/dnslookup-dnsdb
-
-
-
-
29
-
-
85076751448
-
Behavioral clustering of http-based malware and signature generation using malicious network traces
-
Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010)
-
(2010)
NSDI
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
30
-
-
84904093630
-
Vamo: Towards a fully automated malware clustering validity analysis
-
Perdisci, R., U, M.: Vamo: Towards a fully automated malware clustering validity analysis. In: ACSAC (2012)
-
(2012)
ACSAC
-
-
Perdisci, R.1
U, M.2
-
31
-
-
85084094824
-
Ghost turns zombie: Exploring the life cycle of web-based malware
-
Polychronakis, M., Mavrommatis, P., Provos, N.: Ghost turns zombie: Exploring the life cycle of web-based malware. In: LEET (2008)
-
(2008)
LEET
-
-
Polychronakis, M.1
Mavrommatis, P.2
Provos, N.3
-
32
-
-
80053650188
-
All your iframes point to us
-
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: USENIX Security (2008)
-
(2008)
USENIX Security
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
33
-
-
85080711655
-
The ghost in the browser: Analysis of Web-based malware
-
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser: Analysis of Web-based malware. In: HotBots (2007)
-
(2007)
HotBots
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
35
-
-
49949090311
-
Learning and classification of malware behavior
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
36
-
-
79958728571
-
Sandnet: Network traffic analysis of malicious software
-
Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., van Steen, M., Freiling, F.C., Pohlmann, N.: Sandnet: Network traffic analysis of malicious software. In: BADGERS (2011)
-
(2011)
BADGERS
-
-
Rossow, C.1
Dietrich, C.J.2
Bos, H.3
Cavallaro, L.4
Van Steen, M.5
Freiling, F.C.6
Pohlmann, N.7
-
37
-
-
84861616614
-
-
RFC 5965, Updated by RFC 6650
-
Shafranovich, Y., Levine, J., Kucherawy, M.: An extensible format for email feedback reports. RFC 5965, Updated by RFC 6650 (2010)
-
(2010)
An Extensible Format for Email Feedback Reports
-
-
Shafranovich, Y.1
Levine, J.2
Kucherawy, M.3
-
38
-
-
84857360605
-
Abnormally malicious autonomous systems and their internet connectivity
-
Shue, C., Kalafut, A.J., Gupta, M.: Abnormally malicious autonomous systems and their internet connectivity. IEEE/ACMTransactions of Networking 20(1) (2012)
-
(2012)
IEEE/ACMTransactions of Networking
, vol.20
, Issue.1
-
-
Shue, C.1
Kalafut, A.J.2
Gupta, M.3
-
39
-
-
84881182634
-
-
The spamhaus project (2012), http://www.spamhaus.org/
-
(2012)
-
-
-
40
-
-
77950794331
-
Fire: Finding rogue networks
-
Stone-Gross, B., Christopher, K., Almeroth, K., Moser, A., Kirda, E.: Fire: Finding rogue networks. In: ACSAC (2009)
-
(2009)
ACSAC
-
-
Stone-Gross, B.1
Christopher, K.2
Almeroth, K.3
Moser, A.4
Kirda, E.5
-
41
-
-
84881139137
-
-
urlquery, http://urlquery.net/
-
-
-
-
42
-
-
80755145238
-
Effective digital forensics research is investigator-centric
-
Walls, R.J., Levine, B.N., Liberatore, M., Shields, C.: Effective digital forensics research is investigator-centric. In: HotSec (2011)
-
(2011)
HotSec
-
-
Walls, R.J.1
Levine, B.N.2
Liberatore, M.3
Shields, C.4
-
43
-
-
38049026854
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In: NDSS (2006)
-
(2006)
NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
49
-
-
84869441116
-
Arrow: Generating signatures to detect drive-by downloads
-
Zhang, J., Seifert, C., Stokes, J.W., Lee, W.: Arrow: Generating signatures to detect drive-by downloads. In: WWW (2011)
-
(2011)
WWW
-
-
Zhang, J.1
Seifert, C.2
Stokes, J.W.3
Lee, W.4
|