EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration
The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending …
The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending …
Organized cybercrime on the Internet is proliferating due to exploit kits. Attacks launched through these kits include drive-by-downloads, spam and denial-of-service. In this …
The need for transparency and quality control of public ser- vices is crucial for a sustainable development of underserved communities. Information and data collection play a sig- …
Most existing work to thwart malicious web pages capture maliciousness via discriminative artifacts, learn a model, and detect by leveraging static and/or dynamic analysis. …
he steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilities to embed malicious content into web pages. Up on a visit, malicious web pages …
Web applications and server environments hosting them rely on configuration settings that influence their security, usability, and performance. Misconfiguration results in severe …
Empowering citizens in making Governments more accountable and transparent in the services they provide has gained more attention in the last few years both in the developing and …
Malicious web pages are among the major security threats on the Web. Most of the existing techniques for detecting malicious web pages focus on specific attacks. Unfortunately, …
Knowledge about the expected impact of different project and technological choices is fundamental for project planning, resource allocation, and quality of the final software …
Malicious websites, when visited by an unsuspecting victim infect her machine to steal invaluable information, redirect her to malicious targets or compromise her system to mount …