<--- Back to Details
First PageDocument Content
Information science / Information retrieval / URL redirection / Cloaking / Malware / JavaScript / Client honeypot / Cross-site scripting / World Wide Web / Computing / Uniform resource locator / Internet
Date: 2014-09-02 09:17:33
Information science
Information retrieval
URL redirection
Cloaking
Malware
JavaScript
Client honeypot
Cross-site scripting
World Wide Web
Computing
Uniform resource locator
Internet

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Download Document from Source Website

File Size: 324,96 KB

Share Document on Facebook

Similar Documents

Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg   Sebastian Lekies

Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg Sebastian Lekies

DocID: 1xV58 - View Document

Security Announcement ― Cross-Site Scripting (XSS) Vulnerability in Embedded Web Server on MFPs/Printers Dear Customers, The vulnerability was found in the Embedded Web Server* installed in below MFPs and Printers. *No

Security Announcement ― Cross-Site Scripting (XSS) Vulnerability in Embedded Web Server on MFPs/Printers Dear Customers, The vulnerability was found in the Embedded Web Server* installed in below MFPs and Printers. *No

DocID: 1rHhW - View Document

OOPS: That’s Not Supposed to Happen Bypassing IE’s XSS Filter Carlos @RTWaysea

OOPS: That’s Not Supposed to Happen Bypassing IE’s XSS Filter Carlos @RTWaysea

DocID: 1rqqX - View Document

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

DocID: 1rjv6 - View Document

Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites Gustav Rydstedt, Elie Bursztein, Dan Boneh Collin Jackson

Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites Gustav Rydstedt, Elie Bursztein, Dan Boneh Collin Jackson

DocID: 1r3Zx - View Document