[go: up one dir, main page]

Sundareswaran et al., 2010 - Google Patents

Decore: Detecting content repurposing attacks on clients' systems

Sundareswaran et al., 2010

View PDF
Document ID
12399191784749528265
Author
Sundareswaran S
Squicciarini A
Publication year
Publication venue
International Conference on Security and Privacy in Communication Systems

External Links

Snippet

Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike. In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Lee et al. Pride and prejudice in progressive web apps: Abusing native app-like features in web applications
US10291634B2 (en) System and method for determining summary events of an attack
Lu et al. Blade: an attack-agnostic approach for preventing drive-by malware infections
Grier et al. Secure web browsing with the OP web browser
Wang et al. Unauthorized origin crossing on mobile platforms: Threats and mitigation
Franken et al. Who Left Open the Cookie Jar? A Comprehensive Evaluation of {Third-Party} Cookie Policies
KR101442654B1 (en) Systems and methods for behavioral sandboxing
Kirda et al. Client-side cross-site scripting protection
Radhakrishnan et al. A survey of zero-day malware attacks and its detection methodology
Shahriar et al. Client-side detection of cross-site request forgery attacks
Xu et al. Detecting infection onset with behavior-based policies
US11586726B2 (en) Secure web framework
Egele et al. Mitigating drive-by download attacks: Challenges and open problems
Shahriar et al. Proclick: a framework for testing clickjacking attacks in web applications
Sharif Web attacks analysis and mitigation techniques
Onarlioglu et al. Sentinel: Securing legacy firefox extensions
Criscione et al. ZARATHUSTRA: Extracting Webinject signatures from banking trojans
Cvitić et al. Defining cross-site scripting attack resilience guidelines based on BeEF framework simulation
Chang et al. ExtensionGuard: Towards runtime browser extension information leakage detection
US8266704B1 (en) Method and apparatus for securing sensitive data from misappropriation by malicious software
Raman JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks
Ninawe et al. Detection of DOM-based XSS attack on web application
Helmer et al. Anomalous intrusion detection system for hostile Java applets
Sundareswaran et al. Decore: Detecting content repurposing attacks on clients’ systems
Mishra et al. Behavioral Study of Malware Affecting Financial Institutions and Clients