Detecting Malicious Scripts in Web Contents through Remote Code Verification |
Choi, Jae-Yeong
(인천대학교 컴퓨터공학과)
Kim, Sung-Ki (선문대학교 IT교육학부) Lee, Hyuk-Jun (인천대학교 컴퓨터공학과) Min, Byoung-Joon (인천대학교 컴퓨터공학과) |
1 | W. Maes, T. Heyman, L. Desmet, and W. Joosen. "Browser Protection against Cross-Site Request Forgery". In Workshop on Secure Execution of Untrusted Code (SecuCode), 2009. |
2 | C. Jackson and H. J. Wang. "Subspace: Secure Cross-Domain Communication for Web Mashups". In Proceedings of the 16th International World Wide Web Conference (WWW), 2007. |
3 | F. D. Keukelaere, S. Bhola, M. Steiner, S. Chari, and S. Yoshihama. "Smash: secure component model for cross-domain mashups on unmodified browsers". In Proceeding of the 17th international conference on World Wide Web (WWW), 2008. |
4 | C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir. "BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML", In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2006. |
5 | A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. "SpyProxy: Execution-based Detection of Malicious Web Content", In Proceedings of the 16th USENIX Security Symposium, 2007. |
6 | OWASP Foundation, "Cross-Site Request Forgery(CSRF)". https://www.owasp.org/index.php/Cross-Site_Request_For gery, 2010. |
7 | OWASP Foundation, "Cross-site Scripting". https://www. owasp.org/index.php/Cross-site_scripting, 2010. |
8 | Attack & Defense Lab, "Cross Origin Requests Security", http://www.andlabs.org/html5.html |
9 | 민병준, 김성기, 최재영 외, "모바일 접속환경을 위한 웹사이트 침해예방 연구", 한국인터넷진흥원, 2010.09. |
10 | Wikipedia, "Same origin policy", http://en.wikipedia.org/wiki/Same_origin_policy. |
11 | A. van Kesteren, "Cross-Origin Resource Sharing", http://www.w3.org/TR/cors/, W3C Working Draft, 2010. |
12 | S. Hanna, E. Chul, R. Shin, D. Akhawe, A. Boehm, P. Saxena, and D. Song, "The emperor's new APIs: On the (in)secure usage of new client-side primitives", Web2.0 Security and Privacy Conference (W2SP), 2010. |
13 | Adobe, "Cross-domain policy file specification", http://www. adobe.com/devnet/articles/crossdomain_policy_file_spec.html, 2010. |
14 | Yahoo Developer Network's Javascript Developer Center, "JavaScript: Use a Web Proxy for Cross-Domain XML HttpRequest Calls", http://developer.yahoo.com/javascript/howto-proxy.html. |
15 | Google, "Google safe browsing", http://code.google.com/apis/safebrowsing/. |
16 | N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. "The ghost in the browser analysis of web-based malware", Proc. Of the USENIX Workshop on Hot Topics in Understanding Botnets (HotBots), 2007. |
17 | Microsoft, "SmartScreen Filter | Internet Explorer 8 Security.", http://www.microsoft.com/security/filters/smartscreen.aspx. |