-
1
-
-
85180627766
-
-
Ad-Aware. http://www.lavasoftusa.com/software/adaware/.
-
Ad-Aware
-
-
-
2
-
-
19944402322
-
-
October
-
America Online and the National Cyber Security Alliance. AOL/NCSA online safety study. www.staysafeonline.info/news/safety_study_v04.pdf, October 2004.
-
(2004)
AOL/NCSA online safety study
-
-
-
5
-
-
27544433210
-
Semantics-aware malware detection
-
Oakland, CA, May
-
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song, and Randal E. Bryant. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, CA, May 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
-
-
Christodorescu, Mihai1
Jha, Somesh2
Seshia, Sanjit A.3
Song, Dawn4
Bryant, Randal E.5
-
7
-
-
23344439017
-
Spyware was inevitable
-
Steve Gibson. Spyware was inevitable. Communications of the ACM, 48(8):37–39, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 37-39
-
-
Gibson, Steve1
-
8
-
-
23344444212
-
Is spyware an internet nuisance or public menace?
-
Qing Hu and Tamara Dinev. Is spyware an internet nuisance or public menace? Communications of the ACM, 48(8):61–66, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 61-66
-
-
Hu, Qing1
Dinev, Tamara2
-
10
-
-
85180628141
-
-
Kazaa. http://www.kazaa.com.
-
Kazaa
-
-
-
12
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Younghwa Lee and Kenneth A. Kozar. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM, 48(8):72–77, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-77
-
-
Lee, Younghwa1
Kozar, Kenneth A.2
-
13
-
-
0742276097
-
Inside the slammer worm
-
an d and, July
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon an d Stuart Staniford, and Nicholas Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33–39, July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, David1
Paxson, Vern2
Savage, Stefan3
Shannon, Colleen4
Staniford, Stuart5
Weaver, Nicholas6
-
14
-
-
23344452974
-
Spyware: a view from the (online) street
-
Robin Poston, Thomas F. Stafford, and Amy Hennington. Spyware: a view from the (online) street. Communications of the ACM, 48(8):96–99, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 96-99
-
-
Poston, Robin1
Stafford, Thomas F.2
Hennington, Amy3
-
16
-
-
38849103391
-
Measurement and analysis of spyware in a university environment
-
San Francisco, CA, March
-
Stefan Saroiu, Steven D. Gribble, and Henry M. Levy. Measurement and analysis of spyware in a university environment. In Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI’04), San Francisco, CA, March 2004.
-
(2004)
Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI’04)
-
-
Saroiu, Stefan1
Gribble, Steven D.2
Levy, Henry M.3
-
17
-
-
23344441723
-
Spyware: a little knowledge is a wonderful thing
-
Mark B. Schmidt and Kirk P. Arnett. Spyware: a little knowledge is a wonderful thing. Communications of the ACM, 48(8):67–70, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 67-70
-
-
Schmidt, Mark B.1
Arnett, Kirk P.2
-
19
-
-
0013135152
-
Analysis and detection of computer viruses and worms: An annotated bibliography
-
February
-
Prabhat K. Singh and Arun Lakhotia. Analysis and detection of computer viruses and worms: An annotated bibliography. ACM SIGPLAN Notices, 37(2):29–35, February 2002.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.2
, pp. 29-35
-
-
Singh, Prabhat K.1
Lakhotia, Arun2
-
20
-
-
23344454260
-
Introduction to the special issue on spyware
-
Thomas F. Stafford. Introduction to the special issue on spyware. Communications of the ACM, 48(8):34–36, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 34-36
-
-
Stafford, Thomas F.1
-
21
-
-
85084164828
-
Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor
-
Boston, MA, June
-
Jeremy Sugerman, Ganesh Venkitachalam, and Beng-Hong Lim. Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In Proceedings of the 2001 Annual USENIX Technical Conference, Boston, MA, June 2001.
-
(2001)
Proceedings of the 2001 Annual USENIX Technical Conference
-
-
Sugerman, Jeremy1
Venkitachalam, Ganesh2
Lim, Beng-Hong3
-
22
-
-
85180624417
-
-
Sunbelt Software, Inc. April
-
Sunbelt Software, Inc. Sunbelt Software Aquires Web Spidering Technology. Available at http://www.sunbelt-software.com/Press.cfm?id=114, April 2005.
-
(2005)
Sunbelt Software Aquires Web Spidering Technology
-
-
-
23
-
-
23344447680
-
Why spyware poses multiple threats to security
-
Roger Thompson. Why spyware poses multiple threats to security. Communications of the ACM, 48(8):41–43, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 41-43
-
-
Thompson, Roger1
-
24
-
-
33750356750
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Technical Report MSR-TR-2005-72, Microsoft Research, August
-
Yi-Min Wang, Doug Beck, Xuxian Jiang, and Roussi Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. Technical Report MSR-TR-2005-72, Microsoft Research, August 2005.
-
(2005)
-
-
Wang, Yi-Min1
Beck, Doug2
Jiang, Xuxian3
Roussev, Roussi4
-
25
-
-
85180624019
-
-
Technical report, Yokohama, Japan, July
-
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson. Detecting stealth software with Strider GhostBuster. Technical report, Yokohama, Japan, July 2005.
-
(2005)
Detecting stealth software with Strider GhostBuster
-
-
Wang, Yi-Min1
Beck, Doug2
Vo, Binh3
Roussev, Roussi4
Verbowski, Chad5
Johnson, Aaron6
-
26
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management
-
Atlanta, GA, November
-
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, and Sy-Yen Kuo. Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management. In Proceedings of the 18th Large Installation System Administration Conference (LISA’04), Atlanta, GA, November 2004.
-
(2004)
Proceedings of the 18th Large Installation System Administration Conference (LISA’04)
-
-
Wang, Yi-Min1
Roussev, Roussi2
Verbowski, Chad3
Johnson, Aaron4
Wu, Ming-Wei5
Huang, Yennun6
Kuo, Sy-Yen7
-
27
-
-
23344441842
-
A framework for spyware assessment
-
Merrill Warkentin, Xin Luo, and Gary F. Templeton. A framework for spyware assessment. Communications of the ACM, 48(8):79–84, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 79-84
-
-
Warkentin, Merrill1
Luo, Xin2
Templeton, Gary F.3
-
28
-
-
63149143627
-
-
Webroot Software, Inc. Described at
-
Webroot Software, Inc. Automated threat research. Described at http://research.spysweeper.com/automated_research.html.
-
Automated threat research
-
-
-
29
-
-
23344449408
-
What do consumers really know about spyware?
-
Xiaoni Zhang. What do consumers really know about spyware? Communications of the ACM, 48(8):44–48, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 44-48
-
-
Zhang, Xiaoni1
|