Back to Results
First PageMeta Content
Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security


WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu
Add to Reading List

Document Date: 2012-12-11 01:17:01


Open Document

File Size: 432,89 KB

Share Result on Facebook

City

Kit / /

Company

Web 2 / Registrant Yaako Ltd. / Yaako Ltd. / Baidu / Adobe / Google / IT Yaako Ltd. / GoDaddy.com / Invasive Software / Jose Nazario Arbor Networks / Microsoft / /

Country

China / United States / /

Currency

USD / /

/

Facility

Xinhui Han Institute of Computer Science / Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu Jianwei Zhuge Institute of Computer Science / Technology Peking University / /

IndustryTerm

online fashion / large-scale web-based malware infections / proxy-like caching solution / suspicious web content analysis service / web malware infection trails / web proxy / client software / web-based malware logics / real web proxy / multi-path web infection trails / Web Conference / Web-based Malware Measurement Study Provos et al. / web safe browsing / possible web resources / Web-based malware exploit kit / web infection trails / discovered web resources / online service / web-based malware collection / techniques and tools / web-base malware generator / remote site / automatic encrypting tools / individual web pages / web traffic / underground web-based malware adversaries / suspicious web pages / web-based malware collection system / web browser plugin vulnerabilities / web-based malware scenario / honeypot systems / web resources / insecure web sites/pages / web-based malware scenarios / web-based malware instance / typical web-based malware scenario / final web page / http /

OperatingSystem

Windows XP / Microsoft Windows / Linux / DoS / /

Organization

UC Berkeley / National Development and Reform Commission / Peking University / Texas A&M University / Tsinghua University / Malware Scenarios Kevin Zhijie Chen Guofei Gu Jianwei Zhuge Institute of Computer Science / Institute of Computer Science / Caching Service / Research Fund for the Doctoral Program of Higher Education of China / /

Person

Huilin Zhang / Chengyu Song / Xiaorui Gong / Tao Wei / C. Seifert / V / Ruifei Yu / Kevin Zhijie Chen Guofei Gu / Chen Guofei Gu Jianwei / /

Position

∗Corresponding author / Storm Player / mp / analyst / /

Product

Security Advisory 979352 / PHoneyC / Polipo / WebPatrol / /

ProgrammingLanguage

Javascript / Python / HTML / VB / /

ProvinceOrState

Aurora / /

PublishedMedium

Lecture Notes in Computer Science / /

RadioStation

KID 1 / /

Technology

SGML / Linux / top-level domain / API / operating system / HTML / encryption / DHTML / DOM / Document Object Model / Flash / virtual client / virtual machine / av / Operating Systems / PDF / DNS / proxy server / http / caching / simulation / ActiveX / caching system / /

URL

http /

SocialTag