1 |
Alexander Moshchuk, Tanya Bragin, et. al., "A Crawler-based Study of Spyware on the Web," Proc. of the 2008 Networks and Distributed System Security Symposium, pp.17-33, Feb. 2006
|
2 |
Christian Seifert, “Know Your Enemy: Malicious Web Servers,” The Honeynet Project, KYE paper, Aug. 2007
|
3 |
VMCraft web site 가상 머신의 구성 및 분류 http://www.vmcraft.com/technology/vm.vm
|
4 |
J. Zhuge, T. Holz, J. Guo, X. Han, and W. Zou, “Studying Malicious Websites and the Under-ground Economy on the Chinese Web,” Proc. qf the 2008 Workshop on the Economics of Informa-tion Security, June 2008
|
5 |
N. Proves, D. McNamee, et. al., “The Ghost In The Browser Analysis of Web-based Malware,” Proc. of the first USENIX workshop on hot topics in Botnets, Apr. 2007
|
6 |
Niels Provos, Google's Anti-Malware Team, “All Your iFrame Are Point to Us,” Google Technical Report provos-2008a, February 11, 2008
|
7 |
Yi-Min Wang, Doug Beck, et. al., “Automated Web Patrol with Strider HoneyMonkeys,” Proc. of the Networks and Distributed System Security Symposium, pp.35-49, Feb. 2006
|
8 |
Kathy Wang, “Using Honeyclients for Detection an Response Against New Attacks,” MITRE
|
9 |
Yi-Min, et. al., “Strider HoneyMonkeys: Active, Client-Side Honeypots for Finding Malicious Web-sites,” Appear in IEEE Transactions on Computers
|