-
8
-
-
84893029133
-
The role of web hosting providers in detecting compromised websites
-
Republic and Canton of Geneva, Switzerland, International World Wide Web Conferences Steering Committee
-
D. Canali, D. Balzarotti, and A. Francillon. The role of web hosting providers in detecting compromised websites. In Proceedings of the 22nd international conference on World Wide Web, WWW '13, pages 177-188, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering Committee.
-
(2013)
Proceedings of the 22nd International Conference on World Wide Web, WWW '13
, pp. 177-188
-
-
Canali, D.1
Balzarotti, D.2
Francillon, A.3
-
9
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
New York, NY, USA, ACM
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophiler: a fast filter for the large-scale detection of malicious web pages. In Proceedings of the 20th international conference on World wide web, WWW '11, pages 197-206, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 20th International Conference on World Wide Web, WWW '11
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
10
-
-
77954566293
-
Detection and analysis of driveby-download attacks and malicious javascript code
-
New York, NY, USA, ACM
-
M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of driveby-download attacks and malicious javascript code. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 281-290, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web, WWW '10
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
13
-
-
84914134223
-
-
packer
-
D. Edwards. /packer/. http://dean.edwards.name/packer/, 2013.
-
(2013)
-
-
Edwards, D.1
-
20
-
-
84870640932
-
Evilseed: A guided approach to finding malicious web pages
-
Washington, DC, USA, IEEE Computer Society
-
L. Invernizzi, S. Benvenuti, M. Cova, P. M. Comparetti, C. Kruegel, and G. Vigna. Evilseed: A guided approach to finding malicious web pages. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 428-442, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 428-442
-
-
Invernizzi, L.1
Benvenuti, S.2
Cova, M.3
Comparetti, P.M.4
Kruegel, C.5
Vigna, G.6
-
21
-
-
84893405732
-
Data clustering: A review
-
Sept.
-
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: a review. ACM Comput. Surv., 31(3):264-323, Sept. 1999.
-
(1999)
ACM Comput. Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
22
-
-
85076487784
-
Deseo: Combating search-result poisoning
-
Berkeley, CA, USA, USENIX Association
-
J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deseo: combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 20-20, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 20-20
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
23
-
-
84924656413
-
Revolver: An automated approach to the detection of evasiveweb-based malware
-
Berkeley, CA, USA, USENIX Association
-
A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna. Revolver: an automated approach to the detection of evasiveweb-based malware. In Proceedings of the 22nd USENIX conference on Security, SEC'13, pages 637-652, Berkeley, CA, USA, 2013. USENIX Association.
-
(2013)
Proceedings of the 22nd USENIX Conference on Security, SEC'13
, pp. 637-652
-
-
Kapravelos, A.1
Shoshitaishvili, Y.2
Cova, M.3
Kruegel, C.4
Vigna, G.5
-
24
-
-
84869847729
-
Rozzle: De-cloaking internet malware
-
Washington, DC, USA, IEEE Computer Society
-
C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert. Rozzle: De-cloaking internet malware. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 443-457, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 443-457
-
-
Kolbitsch, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
26
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
Berkeley, CA, USA, USENIX Association
-
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 19-19, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 19-19
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
27
-
-
84881260115
-
Finding the linchpins of the dark web: A study on topologically dedicated hosts on malicious web infrastructures
-
Washington, DC, USA, IEEE Computer Society
-
Z. Li, S. Alrwais, Y. Xie, F. Yu, and X. Wang. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 112-126, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
, pp. 112-126
-
-
Li, Z.1
Alrwais, S.2
Xie, Y.3
Yu, F.4
Wang, X.5
-
28
-
-
84869390927
-
Knowing your enemy: Understanding and detecting malicious web advertising
-
New York, NY, USA, ACM
-
Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang. Knowing your enemy: understanding and detecting malicious web advertising. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 674-686, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 674-686
-
-
Li, Z.1
Zhang, K.2
Xie, Y.3
Yu, F.4
Wang, X.5
-
30
-
-
80755169472
-
Surf: Detecting and measuring search poisoning
-
New York, NY, USA, ACM
-
L. Lu, R. Perdisci, and W. Lee. Surf: detecting and measuring search poisoning. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 467-476, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 467-476
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
31
-
-
84905666975
-
-
Microsoft. Microsoft security essentials. http://http://windows.microsoft.com/en-us/windows/security-essentials-download/, 2013.
-
(2013)
Microsoft Security Essentials
-
-
-
33
-
-
84898826133
-
-
Mozilla. Spidermonkey. https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey/, 2013.
-
(2013)
Spidermonkey
-
-
-
34
-
-
33745128489
-
An o(nd) difference algorithm and its variations
-
E. W. Myers. An o(nd) difference algorithm and its variations. Algorithmica, 1:251-266, 1986.
-
(1986)
Algorithmica
, vol.1
, pp. 251-266
-
-
Myers, E.W.1
-
36
-
-
80053650188
-
All your iframes point to us
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Proceedings of the 17th conference on Security symposium, pages 1-15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
37
-
-
85075100360
-
Detecting inflight page changes with web tripwires
-
Berkeley, CA, USA, USENIX Association
-
C. Reis, S. D. Gribble, T. Kohno, and N. C. Weaver. Detecting inflight page changes with web tripwires. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pages 31-44, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08
, pp. 31-44
-
-
Reis, C.1
Gribble, S.D.2
Kohno, T.3
Weaver, N.C.4
-
40
-
-
85084096382
-
Webcop: Locating neighborhoods of malware on the web
-
Berkeley, CA, USA, USENIX Association
-
J. W. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. Webcop: locating neighborhoods of malware on the web. In Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'10, pages 5-5, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'10
, pp. 5-5
-
-
Stokes, J.W.1
Andersen, R.2
Seifert, C.3
Chellapilla, K.4
-
41
-
-
84889042781
-
Shady paths: Leveraging surfing crowds to detect malicious web pages
-
New York, NY, USA, ACM
-
G. Stringhini, C. Kruegel, and G. Vigna. Shady paths: Leveraging surfing crowds to detect malicious web pages. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13, pages 133-144, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13
, pp. 133-144
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
44
-
-
84914134214
-
-
Symantec. 2013 Norton Report. http://www.symantec.com/about/news/resources/press kits/detail.jsp?pkid=norton-report-2013, 2013.
-
(2013)
2013 Norton Report
-
-
-
47
-
-
80755187795
-
Cloak and dagger: Dynamics of web search cloaking
-
Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM
-
D. Y. Wang, S. Savage, and G. M. Voelker. Cloak and dagger: dynamics of web search cloaking. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 477-490. ACM, 2011.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 477-490
-
-
Wang, D.Y.1
Savage, S.2
Voelker, G.M.3
-
49
-
-
84914143172
-
-
Web Sense. Websense 2013 threat report. http://www.websense.com/assets/reports/websense-2013-threat-report.pdf, 2013.
-
(2013)
Websense 2013 Threat Report
-
-
|