1 |
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. "The ghost in the browser analysis of web-based malware, " Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp. 4-4, Apr. 2007.
|
2 |
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?menu_dist=2&seq=22325
|
3 |
Hyo-Nam Kim, Realtime hybrid analysis based on multiple profile for prevention of malware, Hongik Univ., Feb. 2014
|
4 |
Jin-Kyung Kim, A design of anomaly detection with automata dynamic profile, Hansei Univ., Feb. 2014
|
5 |
Chen, K.Z., Gu, G., Zhuge, J., Nazario, J., and Han, X.., "WebPatrol: Automated collection and replay of web-based malware scenarios," Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp.186-195, Mar. 2011.
|
6 |
Sang-Yong Choi, Multi-level emulation for malware distribution networks analysis, Journal of The Korea Institute of Information Security & Cryptology, VOL.23, NO.6, Dec. 2013.
과학기술학회마을
DOI
ScienceOn
|
7 |
Chang-Wook Park, First URL lookup using URL prefix hash tree, Journal of The Korea Institute of Information Science, Vol. 35, No.1, pp. 67-75, Oct. 2007.
|
8 |
https://www.Malwares.com
|
9 |
SpiderMonkey, "https://developer.mozilla.org/en-US/ docs/Mozilla/Projects/SpiderMonkey"
|
10 |
Yongwook Lee, Design and implementation of web-browser based malicious behavior detection system(WMDS), Journal of The Korea Institute of Information Security & Cryptology, Vol.22, No.3, pp. 667-677, Jun. 2012.
|
11 |
Manuel Egele, Peter Wurzinger, Christopher Kruegel, and Engin Kirda, Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks, ACM New York, pp. 281-290, 2010.
|
12 |
https://www.VirusTotal.com
|