Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Brett Stone-Gross"'
Autor:
Marco Cova, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna, Richard A. Kemmerer, Bob Gilbert
Publikováno v:
IEEE Security & Privacy Magazine. 9:64-72
Botnets, networks of malware-infected machines (bots) that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program
Publikováno v:
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus.
Autor:
Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Christian J. Dietrich, Herbert Bos
Publikováno v:
P2PWNED --- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Publikováno v:
Andriesse, D, Rossow, C, Stone-Gross, B, Plohmann, D & Bos, H 2013, Highly resilient peer-to-peer botnets are here : An analysis of Gameover Zeus . in 2013 8th International Conference on Malicious and Unwanted Software [Proceedings] : "The Americas", MALWARE 2013 ., 6703693, ACM, IEEE Computer Society, Fajardo, Puerto Rico, USA, pp. 116-123, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, United States, 22/10/13 . https://doi.org/10.1109/MALWARE.2013.6703693
2013 8th International Conference on Malicious and Unwanted Software [Proceedings]: "The Americas", MALWARE 2013, 116-123
STARTPAGE=116;ENDPAGE=123;TITLE=2013 8th International Conference on Malicious and Unwanted Software [Proceedings]
MALWARE
2013 8th International Conference on Malicious and Unwanted Software [Proceedings]: "The Americas", MALWARE 2013, 116-123
STARTPAGE=116;ENDPAGE=123;TITLE=2013 8th International Conference on Malicious and Unwanted Software [Proceedings]
MALWARE
Zeus is a family of credential-stealing trojans which originally appeared in 2007. The first two variants of Zeus are based on centralized command servers. These command servers are now routinely tracked and blocked by the security community. In an a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9959e44b46a2ad840026f832eb4b224c
https://hdl.handle.net/1871.1/d89c7886-ab35-4f06-ba47-011e3f6da2e1
https://hdl.handle.net/1871.1/d89c7886-ab35-4f06-ba47-011e3f6da2e1
Autor:
Douglas G. Steigerwald, Ryan Abman, Brett Stone-Gross, Christopher Kruegel, Richard A. Kemmerer, Giovanni Vigna
Publikováno v:
Economics of Information Security and Privacy III ISBN: 9781461419808
WEIS
WEIS
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec85155003434531ae8806f0a5358f40
https://doi.org/10.1007/978-1-4614-1981-5_4
https://doi.org/10.1007/978-1-4614-1981-5_4
Publikováno v:
INFOCOM
Drive-by-download attacks have become the method of choice for cyber-criminals to infect machines with malware. Previous research has focused on developing techniques to detect web sites involved in drive-by-download attacks, and on measuring their p
Autor:
Brett Stone-Gross, Christopher Kruegel, Apostolis Zarras, Giovanni Vigna, Richard A. Kemmerer, Ryan Stevens
Publikováno v:
Internet Measurement Conference
Delft University of Technology
IMC '11: Proceedings of the 11th ACM Internet Measurement Conference (IMC), 279-294
STARTPAGE=279;ENDPAGE=294;TITLE=IMC '11
Delft University of Technology
IMC '11: Proceedings of the 11th ACM Internet Measurement Conference (IMC), 279-294
STARTPAGE=279;ENDPAGE=294;TITLE=IMC '11
Online advertisements (ads) provide a powerful mechanism for advertisers to effectively target Web users. Ads can be customized based on a user's browsing behavior, geographic location, and personal interests. There is currently a multi-billion dolla
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41b11446cdb69e7251a6cafc96c7dcc9
https://doi.org/10.1145/2068816.2068843
https://doi.org/10.1145/2068816.2068843
Publikováno v:
ACSAC
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizations such as the Russian Business Network (RBN), Atrivo (a.k.a., Intercag
Autor:
Brett Stone-Gross, Richard A. Kemmerer, Christopher Kruegel, Martin Szydlowski, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Giovanni Vigna
Publikováno v:
CCS '09 Proceedings of the 16th ACM conference on Computer and communications security
ACM Conference on Computer and Communications Security
ACM Conference on Computer and Communications Security
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d7889d0ad7d4538bb6a333e08618eb0d
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783540705413
DIMVA
DIMVA
This paper presents a novel framework to substantiate self-signed certificates in the absence of a trusted certificate authority. In particular, we aim to address the problem of web-based SSL man-in-the-middle attacks. This problem originates from th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e2686f54bf6c1a0269aab91280b66b41
https://doi.org/10.1007/978-3-540-70542-0_3
https://doi.org/10.1007/978-3-540-70542-0_3