Sundareswaran et al., 2010 - Google Patents
Decore: Detecting content repurposing attacks on clients' systemsSundareswaran et al., 2010
View PDF- Document ID
- 12399191784749528265
- Author
- Sundareswaran S
- Squicciarini A
- Publication year
- Publication venue
- International Conference on Security and Privacy in Communication Systems
External Links
Snippet
Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike. In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which …
- 230000003993 interaction 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Pride and prejudice in progressive web apps: Abusing native app-like features in web applications | |
US10291634B2 (en) | System and method for determining summary events of an attack | |
Lu et al. | Blade: an attack-agnostic approach for preventing drive-by malware infections | |
Grier et al. | Secure web browsing with the OP web browser | |
Wang et al. | Unauthorized origin crossing on mobile platforms: Threats and mitigation | |
Franken et al. | Who Left Open the Cookie Jar? A Comprehensive Evaluation of {Third-Party} Cookie Policies | |
KR101442654B1 (en) | Systems and methods for behavioral sandboxing | |
Kirda et al. | Client-side cross-site scripting protection | |
Radhakrishnan et al. | A survey of zero-day malware attacks and its detection methodology | |
Shahriar et al. | Client-side detection of cross-site request forgery attacks | |
Xu et al. | Detecting infection onset with behavior-based policies | |
US11586726B2 (en) | Secure web framework | |
Egele et al. | Mitigating drive-by download attacks: Challenges and open problems | |
Shahriar et al. | Proclick: a framework for testing clickjacking attacks in web applications | |
Sharif | Web attacks analysis and mitigation techniques | |
Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
Criscione et al. | ZARATHUSTRA: Extracting Webinject signatures from banking trojans | |
Cvitić et al. | Defining cross-site scripting attack resilience guidelines based on BeEF framework simulation | |
Chang et al. | ExtensionGuard: Towards runtime browser extension information leakage detection | |
US8266704B1 (en) | Method and apparatus for securing sensitive data from misappropriation by malicious software | |
Raman | JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks | |
Ninawe et al. | Detection of DOM-based XSS attack on web application | |
Helmer et al. | Anomalous intrusion detection system for hostile Java applets | |
Sundareswaran et al. | Decore: Detecting content repurposing attacks on clients’ systems | |
Mishra et al. | Behavioral Study of Malware Affecting Financial Institutions and Clients |