Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

作者: Sajjad Arshad , Amin Kharraz , William K. Robertson

DOI: 10.1007/978-3-662-54970-4_26

关键词:

摘要: Modern websites include various types of third-party content such as JavaScript, images, stylesheets, and Flash objects in order to create interactive user interfaces. In addition to …

参考文章(32)
Mike Ter Louw, V. N. Venkatakrishnan, Karthik Thotta Ganesh, AdJail: practical enforcement of confidentiality and integrity policies on web advertisements usenix security symposium. pp. 24- 24 ,(2010)
Michael Weissbacher, Tobias Lauinger, William Robertson, Why Is CSP Failing? Trends and Challenges in CSP Adoption recent advances in intrusion detection. pp. 212- 233 ,(2014) , 10.1007/978-3-319-11379-1_11
Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon Mccoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab, Ad Injection at Scale: Assessing Deceptive Advertisement Modifications 2015 IEEE Symposium on Security and Privacy. pp. 151- 167 ,(2015) , 10.1109/SP.2015.17
Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. pp. 403- 414 ,(2015) , 10.1109/DSN.2015.35
Neha Chachra, Vern Paxson, Christopher Kruegel, Chris Grier, Alexandros Kapravelos, Giovanni Vigna, Hulk: eliciting malicious behavior in browser extensions usenix security symposium. pp. 641- 654 ,(2014)
Alexander Moshchuk, Chris Grier, Helen J. Wang, Herman Venter, Piali Choudhury, Samuel T. King, The multi-principal OS construction of the gazelle web browser usenix security symposium. pp. 417- 432 ,(2009)
Arvind Krishnamurthy, John P. John, Yinglian Xie, Martín Abadi, Fang Yu, deSEO: combating search-result poisoning usenix security symposium. pp. 20- 20 ,(2011)
Haohui Mai, Shuo Tang, Samuel T. King, Trust and protection in the Illinois browser operating system operating systems design and implementation. pp. 17- 31 ,(2010) , 10.5555/1924943.1924945
David D. Lewis, Naive (Bayes) at forty: The independence assumption in information retrieval Machine Learning: ECML-98. pp. 4- 15 ,(1998) , 10.1007/BFB0026666
Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi, EXPOSURE : Finding malicious domains using passive DNS analysis network and distributed system security symposium. ,(2011)