共 13 条
[1]
Provos N,McNamee D,Mavrommatis P,et al.The ghost in thebrowser analysis of Web-based malware. Proceedings of theFirst Workshop on Hot Topics in Understanding Botnets . 2007
[2]
Cova M,Kruegel C,Vigna G,et al.Detection and analysisof drive-bydownload attacks and malicious javascript code. Proceedings of the 19th International World Wide WebConference(WWW 10) . 2010
[3]
Moshchuk A,Bragin T,Deville D,et al.SpyProxy:Execution-based detection of malicious web content. Proceedings of the 16th USENIX Security Symposium(Security 07) . 2007
[4]
Seifert C,,Welch I,Komisarczuk P.Identification ofmalicious web pages with static heuristics. Proceedingsof the Austalasian Telecommunication Networks andApplications Conference . 2008
[5]
Wang YiMin,D Beck,Jiang Xuxian et al.Automated web patrol with strider HoneyMonkeys: finding web sites that exploit browser vulnerabilities. Proc. of the 14th USENIX security symposium . 2006
[6]
Provos N,Mavrommatis P,Rajab M A,et al.All YouriFrames point to us. 17th USENIXSecurity Symposium(USENIX Security 08) . 2008
[7]
Nazario J.PHoneyC:A virtual client honeypot. 2ndUSENIX Workshop on Large-Scale Exploits and EmergentThreats(LEET 09) . 2009
[8]
CHEN Zhijie,GU Guofei,Nazario Jose,et al.WebPatrol:Automated collection and replay of web-based malware. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2011) . 2011
[9]
A Moshchuk,T Bragin,SD Gribble.A crawler-based study of spyware on the web. Proc. of 13th Annual Network and Distributed System Security Symposium . 2006
[10]
Davide Canali,Marco Cova,Giovanni Vigna,et al.Prophiler:A fast filter for the large-scale detection ofmalicious web pages. Proceedings of the 20thInternational World Wide Web Conference(WWW 11) . 2011