메뉴 건너뛰기




Volumn 45, Issue 4, 2013, Pages

Analyzing and defending against web-based malware

Author keywords

Web based malware

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; INTRUSION DETECTION; NETWORK SECURITY; SURVEYS; TESTING; WEBSITES;

EID: 84885193039     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2501654.2501663     Document Type: Article
Times cited : (38)

References (113)
  • 12
    • 0003659021 scopus 로고    scopus 로고
    • BIND VULNERABILITIES
    • BIND VULNERABILITIES. 1998. Multiple vulnerabilities in bind. ftp://info.cert.org/pub/certadvisories/CA-98.05.bindproblems.
    • (1998) Multiple Vulnerabilities in Bind
  • 16
    • 85206053539 scopus 로고    scopus 로고
    • Chrome MALWARE
    • CHROME MALWARE. 2010. New drive-by attack targets google chrome users. http://downloadsquad.switched.com/2010/04/20/new-drive-by-attack-targets-google- chrome-users/.
    • (2010) New Drive-by Attack Targets Google Chrome Users
  • 26
    • 77954525433 scopus 로고    scopus 로고
    • Caffeine monkey: Automated collection, detection and analysis of malicious javascript
    • FEINSTEIN, B. AND PECK, D. 2007. Caffeine monkey: Automated collection, detection and analysis of malicious javascript. In Proceedings of BlackHat USA. https://www.blackhat.com/presentations/bh-usa-07/Feinstein and Peck/Whitepaper/bh-usa-07-feinstein and peck-WP.pdf.
    • (2007) Proceedings of BlackHat USA
    • Feinstein, B.1    Peck, D.2
  • 32
    • 85206044015 scopus 로고    scopus 로고
    • Google Safe Browsing PROJECT
    • GOOGLE SAFE BROWSING PROJECT. 2011. Google safe browsing api homepage. http://code.google.com/apis/safebrowsing/.
    • (2011) Google Safe Browsing Api Homepage
  • 33
    • 71449127664 scopus 로고    scopus 로고
    • GOOGLE WEB INDEX. 2008. We knew the web was big. http://googleblog. blogspot.com/2008/07/we-knew-webwas-big.html.
    • (2008) We Knew the Web Was Big
  • 35
    • 84890883068 scopus 로고    scopus 로고
    • Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
    • USENIX Association, Berkeley, CA
    • GUARNIERI, S. AND LIVSHITS, B. 2009. Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09). USENIX Association, Berkeley, CA, 151-168.
    • (2009) Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09) , pp. 151-168
    • Guarnieri, S.1    Livshits, B.2
  • 40
    • 56549084673 scopus 로고    scopus 로고
    • Tech. rep. 286, Purdue University, Department of Computer Science
    • IDIKA, N. ANDMATHUR, A. P. 2010. A survey ofmalware detection techniques. Tech. rep. 286, Purdue University, Department of Computer Science. http://www.internetworldstats.com/stats.htm.
    • (2010) A Survey Ofmalware Detection Techniques
    • Idika, N.1    Andmathur, A.P.2
  • 42
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • JACOB, G., DEBAR, H., AND FILIOL, E. 2008. Behavioral detection of malware: From a survey towards an established taxonomy. J. Comput. Virol. 4, 251-266.
    • (2008) J. Comput. Virol. , vol.4 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 46
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • IEEE Computer Society, Los Alamitos, CA
    • JOVANOVIC, N., KRUEGEL, C., AND KIRDA, E. 2006a. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 258-263.
    • (2006) Proceedings of the IEEE Symposium on Security and Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 52
    • 36248965112 scopus 로고    scopus 로고
    • Web 2.0 creates security challenges
    • LAWTON, G. 2007. Web 2.0 creates security challenges. Comput. 40, 10, 13-16.
    • (2007) Comput. , vol.40 , Issue.10 , pp. 13-16
    • Lawton, G.1
  • 54
    • 77953145744 scopus 로고    scopus 로고
    • A survey of internet worm detection and containment
    • LI, P., SALOUR, M., AND SU, X. 2008. A survey of internet worm detection and containment. IEEE Comm. Surv. Tutorials 10, 1, 20-35.
    • (2008) IEEE Comm. Surv. Tutorials , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 56
    • 34249295260 scopus 로고    scopus 로고
    • Building web 2.0
    • LIN, K.-J. 2007. Building web 2.0. Comput. 40, 5, 101-102.
    • (2007) Comput. , vol.40 , Issue.5 , pp. 101-102
    • Lin, K.-J.1
  • 58
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • LUNT, T. F. 1993. A survey of intrusion detection techniques. Comput. Secur. 12, 4, 405-418.
    • (1993) Comput. Secur. , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 70
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • PENG, T., LECKIE, C., AND RAMAMOHANARAO, K. 2007. Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv. 39, 1.
    • (2007) ACM Comput. Surv. , vol.39 , pp. 1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 75
    • 19944374456 scopus 로고    scopus 로고
    • A survey and trends on internet worms
    • QING, S. AND WEN, W. 2005. A survey and trends on internet worms. Comput. Secur. 24, 4, 334-346.
    • (2005) Comput. Secur. , vol.24 , Issue.4 , pp. 334-346
    • Qing, S.1    Wen, W.2
  • 80
    • 84885235188 scopus 로고    scopus 로고
    • RFC-2828.
    • RFC-2828. 2000. IETF RFC 2828. http://tools.ietf.org/html/rfc2828/.
    • (2000) IETF RFC 2828
  • 83
    • 0032164210 scopus 로고    scopus 로고
    • A survey of web security
    • RUBIN, A. AND GEER, D. E., J. 1998. A survey of web security. Comput. 31, 9, 34-41.
    • (1998) Comput. , vol.31 , Issue.9 , pp. 34-41
    • Rubin, A.1    Geer, D.E.J.2
  • 92
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
    • SHABTAI, A.,MOSKOVITCH, R.,ELOVICI, Y., AND GLEZER, C. 2009. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14, 16-29.
    • (2009) Inf. Secur. Tech. Rep. , vol.14 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 100
    • 85206061156 scopus 로고    scopus 로고
    • TOP TEN PROJECT
    • TOP TEN PROJECT. 2011. OWASP top ten project. http://www.owasp.org/.
    • (2011) OWASP Top Ten Project
  • 103
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. 2004. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM Comput. Comm. Rev. 34, 193-204.
    • (2004) SIGCOMM Comput. Comm. Rev. , vol.34 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 109
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • USENIX Association, Berkeley, CA
    • XIE, Y. AND AIKEN, A. 2006. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th USENIX Security Symposium. Vol. 15, USENIX Association, Berkeley, CA.
    • (2006) Proceedings of the 15th USENIX Security Symposium , vol.15
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.