Detecting Malicious Scripts in Web Contents through Remote Code Verification
نویسندگان
چکیده
منابع مشابه
Detecting Malicious Code by Model Checking
The ease of compiling malicious code from source code in higher programming languages has increased the volatility of malicious programs: The first appearance of a new worm in the wild is usually followed by modified versions in quick succession. As demonstrated by Christodorescu and Jha, however, classical detection software relies on static patterns, and is easily outsmarted. In this paper, w...
متن کاملDetecting Malicious Web Servers with Honeyclients
Using malicious sites to launch attacks against client user applications is a growing threat in recent years. This led to emergence of new technologies to counter and detect attacks against end user. One of these technologies is honeyclient (aka client honeypot). Honeyclients crawl the Internet to find and identify web servers that exploit clientside vulnerabilities. In this paper, we address h...
متن کاملIdentifying Malicious Code Through Reverse Engineering
New updated! The latest book from a very famous author finally comes out. Book of identifying malicious code through reverse engineering, as an amazing reference becomes what you need to get. What's for is this book? Are you still thinking for what the book is? Well, this is what you probably will get. You should have made proper choices for your better life. Book, as a source that may involve ...
متن کاملMalicious Code Detection through Data Mining Techniques
Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be increase in necessity in the coming time, as the number of software developers and applications will likely grow very significantly. As important advances have been already made on...
متن کاملDetecting Malicious Code by Exploiting Dependencies of System-call Groups
In this paper we present an elaborated graph-based algorithmic technique for efficient malware detection. More precisely, we utilize the system-call dependency graphs (or, for short ScD graphs), obtained by capturing taint analysis traces and a set of various similarity metrics in order to detect whether an unknown test sample is a malicious or a benign one. For the sake of generalization, we d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2012
ISSN: 1598-2858
DOI: 10.3745/kipstc.2012.19c.1.047