메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

MALWARE; SEARCH ENGINES; TOPOLOGY; ZERO-DAY ATTACK;

EID: 84904088330     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (209)

References (55)
  • 3
    • 85180622908 scopus 로고    scopus 로고
    • [AL] Alexa
    • [AL] Alexa, http://www.alexa.com/.
  • 6
    • 85180624968 scopus 로고    scopus 로고
    • [B04] Nov
    • [B04] Xpire.info, http://www.vitalsecurity.org/xpiresplitinfinity-serverhack_malwareinstall-condensed.pdf, Nov. 2004.
    • (2004) Xpire.info
  • 7
    • 85009448253 scopus 로고    scopus 로고
    • PointGuard: Protecting pointers from buffer overflow vulnerabilities
    • [CBJ+03] in August
    • [CBJ+03] C. Cowan, S. Beattie, J. Johansen, and P. Wagle. “PointGuard: Protecting pointers from buffer overflow vulnerabilities,” in Proc. USENIX Security Symposium, August 2003.
    • (2003) Proc. USENIX Security Symposium
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 9
    • 85180633383 scopus 로고    scopus 로고
    • [CWS05] TechWeb, March 30
    • [CWS05] “Webroot: CoolWebSearch Top Spyware Threat,” http://www.techweb.com/showArticle.jhtml?articleID=16040 0314, TechWeb, March 30, 2005.
    • (2005) Webroot: CoolWebSearch Top Spyware Threat
  • 10
    • 85180637440 scopus 로고    scopus 로고
    • [D04] June
    • [D04] Download.Ject, http://www.microsoft.com/security/incident/download_ject.ms px, June 2004.
    • (2004) Download.Ject
  • 16
    • 4544280267 scopus 로고    scopus 로고
    • Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems
    • [G04] in June
    • [G04] Archana Ganapathi, Yi-Min Wang, Ni Lao, and Ji-Rong Wen, "Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems", in Proc. IEEE DSN/DCC, June 2004.
    • (2004) Proc. IEEE DSN/DCC
    • Ganapathi, Archana1    Wang, Yi-Min2    Lao, Ni3    Wen, Ji-Rong4
  • 19
    • 85180623003 scopus 로고    scopus 로고
    • Another round of DNS cache poisoning
    • [HD05] March 30
    • [HD05] “Another round of DNS cache poisoning,” Handlers Diary, March 30, 2005, http://isc.sans.org/.
    • (2005) Handlers Diary
  • 24
    • 85180627944 scopus 로고    scopus 로고
    • [ISP]
    • [ISP] ISP Ranking by Subscriber, http://www.ispplanet.com/research/rankings/index.html.
    • ISP Ranking by Subscriber
  • 25
    • 85180637318 scopus 로고    scopus 로고
    • [IW05] InfoWorld.com, March 7
    • [IW05] “Scammers use Symantec, DNS holes to push adware,” InfoWorld.com, March 7, 2005, http://www.infoworld.com/article/05/03/07/HNsymantecholesandadware_1.html?DESKTOP%20SECURITY.
    • (2005) Scammers use Symantec, DNS holes to push adware
  • 26
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-Based Architecture for Network Attack Detention Center
    • [J04] in Aug
    • [J04] Xuxian Jiang, Dongyan Xu, “Collapsar: A VM-Based Architecture for Network Attack Detention Center”, in Proc. USENIX Security Symposium, Aug. 2004.
    • (2004) Proc. USENIX Security Symposium
    • Jiang, Xuxian1    Xu, Dongyan2
  • 29
    • 84885639914 scopus 로고    scopus 로고
    • Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates
    • [JKD+05] in
    • [JKD+05] Ashlesha Joshi, Sam King, George Dunlap, Peter Chen, “Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates,” in Proc. SOSP, 2005.
    • (2005) Proc. SOSP
    • Joshi, Ashlesha1    King, Sam2    Dunlap, George3    Chen, Peter4
  • 30
    • 33645756878 scopus 로고    scopus 로고
    • The Use of Honeynets to Increase Computer Network Security and User Awareness
    • [KGO+05] in March
    • [KGO+05] Sven Krasser, Julian Grizzard, Henry Owen, and John Levine, “The Use of Honeynets to Increase Computer Network Security and User Awareness”, in Journal of Security Education, pp. 23-37, vol. 1, no. 2/3. March 2005.
    • (2005) Journal of Security Education , vol.1 , Issue.2/3 , pp. 23-37
    • Krasser, Sven1    Grizzard, Julian2    Owen, Henry3    Levine, John4
  • 35
    • 2342615538 scopus 로고    scopus 로고
    • Anti-honeypot technology
    • [NK04] Jan.-Feb. Page(s)
    • [NK04] Neal Krawetz, Anti-honeypot technology, Security & Privacy Magazine, IEEE Volume 2, Issue 1, Jan.-Feb. 2004 Page(s):76–79.
    • (2004) Security & Privacy Magazine, IEEE , vol.2 , Issue.1 , pp. 76-79
    • Krawetz, Neal1
  • 39
    • 84896264057 scopus 로고    scopus 로고
    • November
    • [R04] Team Register, “Bofra exploit hits our ad serving supplier,” http://www.theregister.co.uk/2004/11/21/register_adserver_attack/, November 2004.
    • (2004) Bofra exploit hits our ad serving supplier
  • 40
    • 33750543292 scopus 로고    scopus 로고
    • [RP]
    • [RP] Red Pill, http://invisiblethings.org/papers/redpill.html.
    • Red Pill
  • 43
    • 85180629518 scopus 로고    scopus 로고
    • [SH] Aug
    • [SH] “What is Strider HoneyMonkey,” http://research.microsoft.com/honeymonkey/article.aspx, Aug. 2005.
    • (2005) What is Strider HoneyMonkey
  • 49
    • 85180624152 scopus 로고    scopus 로고
    • [VT] Vanderpool Technology, Technical report, Intel Corporation
    • [VT] Vanderpool Technology, Technical report, Intel Corporation, 2005.
    • (2005)
  • 50
    • 4544350077 scopus 로고    scopus 로고
    • STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
    • [W03] in Oct
    • [W03] Yi-Min Wang, et al., “STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support”, in Proc. Usenix LISA, Oct. 2003.
    • (2003) Proc. Usenix LISA
    • Wang, Yi-Min1
  • 51
    • 33750584355 scopus 로고    scopus 로고
    • Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
    • [W04] in
    • [W04] Yi-Min Wang, et al., “Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management”, in Proc. Usenix LISA, 2004
    • (2004) Proc. Usenix LISA
    • Wang, Yi-Min1
  • 53
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
    • [WGS+04] in August
    • [WGS+04] Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier, “Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits,” in Proc. ACM SIGCOMM, August 2004.
    • (2004) Proc. ACM SIGCOMM
    • Wang, Helen J.1    Guo, Chuanxiong2    Simon, Daniel R.3    Zugenmaier, Alf4
  • 55
    • 85180626569 scopus 로고    scopus 로고
    • [XSS] March 28
    • [XSS] “Code insertion in Blogger comments”, March 28, 2005, http://www.securityfocus.com/archive/1/394532.
    • (2005) Code insertion in Blogger comments


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.