메뉴 건너뛰기




Volumn , Issue , 2014, Pages 3-18

Hunting the red fox online: Understanding and detection of mass redirect-script injections

Author keywords

Compromised Web Sites; Differential Analysis; Web Redirection

Indexed keywords

HTML; PEER TO PEER NETWORKS; SEARCH ENGINES; WEBSITES;

EID: 84910665242     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.8     Document Type: Conference Paper
Times cited : (36)

References (50)
  • 8
    • 84893029133 scopus 로고    scopus 로고
    • The role of web hosting providers in detecting compromised websites
    • Republic and Canton of Geneva, Switzerland, International World Wide Web Conferences Steering Committee
    • D. Canali, D. Balzarotti, and A. Francillon. The role of web hosting providers in detecting compromised websites. In Proceedings of the 22nd international conference on World Wide Web, WWW '13, pages 177-188, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering Committee.
    • (2013) Proceedings of the 22nd International Conference on World Wide Web, WWW '13 , pp. 177-188
    • Canali, D.1    Balzarotti, D.2    Francillon, A.3
  • 13
    • 84914134223 scopus 로고    scopus 로고
    • packer
    • D. Edwards. /packer/. http://dean.edwards.name/packer/, 2013.
    • (2013)
    • Edwards, D.1
  • 21
    • 84893405732 scopus 로고    scopus 로고
    • Data clustering: A review
    • Sept.
    • A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: a review. ACM Comput. Surv., 31(3):264-323, Sept. 1999.
    • (1999) ACM Comput. Surv. , vol.31 , Issue.3 , pp. 264-323
    • Jain, A.K.1    Murty, M.N.2    Flynn, P.J.3
  • 26
    • 84888088814 scopus 로고    scopus 로고
    • Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
    • Berkeley, CA, USA, USENIX Association
    • N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 19-19, Berkeley, CA, USA, 2011. USENIX Association.
    • (2011) Proceedings of the 20th USENIX Conference on Security, SEC'11 , pp. 19-19
    • Leontiadis, N.1    Moore, T.2    Christin, N.3
  • 27
    • 84881260115 scopus 로고    scopus 로고
    • Finding the linchpins of the dark web: A study on topologically dedicated hosts on malicious web infrastructures
    • Washington, DC, USA, IEEE Computer Society
    • Z. Li, S. Alrwais, Y. Xie, F. Yu, and X. Wang. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 112-126, Washington, DC, USA, 2013. IEEE Computer Society.
    • (2013) Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13 , pp. 112-126
    • Li, Z.1    Alrwais, S.2    Xie, Y.3    Yu, F.4    Wang, X.5
  • 31
    • 84905666975 scopus 로고    scopus 로고
    • Microsoft. Microsoft security essentials. http://http://windows.microsoft.com/en-us/windows/security-essentials-download/, 2013.
    • (2013) Microsoft Security Essentials
  • 33
    • 84898826133 scopus 로고    scopus 로고
    • Mozilla. Spidermonkey. https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey/, 2013.
    • (2013) Spidermonkey
  • 34
    • 33745128489 scopus 로고
    • An o(nd) difference algorithm and its variations
    • E. W. Myers. An o(nd) difference algorithm and its variations. Algorithmica, 1:251-266, 1986.
    • (1986) Algorithmica , vol.1 , pp. 251-266
    • Myers, E.W.1
  • 38
  • 42
  • 44
    • 84914134214 scopus 로고    scopus 로고
    • Symantec. 2013 Norton Report. http://www.symantec.com/about/news/resources/press kits/detail.jsp?pkid=norton-report-2013, 2013.
    • (2013) 2013 Norton Report
  • 47
    • 80755187795 scopus 로고    scopus 로고
    • Cloak and dagger: Dynamics of web search cloaking
    • Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM
    • D. Y. Wang, S. Savage, and G. M. Voelker. Cloak and dagger: dynamics of web search cloaking. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 477-490. ACM, 2011.
    • (2011) ACM Conference on Computer and Communications Security , pp. 477-490
    • Wang, D.Y.1    Savage, S.2    Voelker, G.M.3
  • 49
    • 84914143172 scopus 로고    scopus 로고
    • Web Sense. Websense 2013 threat report. http://www.websense.com/assets/reports/websense-2013-threat-report.pdf, 2013.
    • (2013) Websense 2013 Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.