{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:36:57Z","timestamp":1725734217514},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866356","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"page":"440-450","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":90,"title":["BLADE"],"prefix":"10.1145","author":[{"given":"Long","family":"Lu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"}}Alexa - Top Sites By Category. http:\/\/www.alexa.com\/topsites\/category. }}Alexa - Top Sites By Category. http:\/\/www.alexa.com\/topsites\/category."},{"key":"e_1_3_2_1_2_1","unstructured":"}}Microsoft Security Bulletin MS10-002 - Critical. http:\/\/www.microsoft.com\/technet\/security\/bulletin\/MS10- 002.mspx. }}Microsoft Security Bulletin MS10-002 - Critical. http:\/\/www.microsoft.com\/technet\/security\/bulletin\/MS10- 002.mspx."},{"key":"e_1_3_2_1_3_1","unstructured":"}}Process Monitor. http:\/\/technet.microsoft.com\/enus\/ sysinternals\/bb896645.aspx. }}Process Monitor. http:\/\/technet.microsoft.com\/enus\/ sysinternals\/bb896645.aspx."},{"key":"e_1_3_2_1_4_1","unstructured":"}}Testing rendering time. http:\/\/scragz.com\/archived\/mozilla\/test-rendering-time. }}Testing rendering time. http:\/\/scragz.com\/archived\/mozilla\/test-rendering-time."},{"key":"e_1_3_2_1_5_1","unstructured":"}}finjan: securing your web. http:\/\/www.finjan.com 2009. }}finjan: securing your web. http:\/\/www.finjan.com 2009."},{"volume-title":"http:\/\/www.stopbadware.org","year":"2009","key":"e_1_3_2_1_6_1","unstructured":"}}stopbadware.org. http:\/\/www.stopbadware.org , 2009 . }}stopbadware.org. http:\/\/www.stopbadware.org, 2009."},{"volume-title":"http:\/\/www.symantec.com","year":"2009","key":"e_1_3_2_1_7_1","unstructured":"}}Symantec inc. http:\/\/www.symantec.com , 2009 . }}Symantec inc. http:\/\/www.symantec.com, 2009."},{"key":"e_1_3_2_1_8_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Adam B.","year":"2010","unstructured":"}} B. Adam , P. F. Adrienne , S. Prateek , and B. Aaron . Protecting browsers from extension vulnerabilities . In Network and Distributed System Security Symposium (NDSS) , 2010 . }}B. Adam, P. F. Adrienne, S. Prateek, and B. Aaron. Protecting browsers from extension vulnerabilities. In Network and Distributed System Security Symposium (NDSS), 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"Special Workshop on Malware Detection, Advances in Information Security","author":"Barford P.","year":"2006","unstructured":"}} P. Barford and V. Yegneswaran . An inside look at botnets . Special Workshop on Malware Detection, Advances in Information Security , Springer Verlag , 2006 . }}P. Barford and V. Yegneswaran. An inside look at botnets. Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag, 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.6"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the USENIX System Adminstrator's Conference, LISA","author":"Dietrich S.","year":"2000","unstructured":"}} S. Dietrich , N. Long , and D. Dittrich . Analyzing distributed denial of service tools: The Shaft Case . In Proceedings of the USENIX System Adminstrator's Conference, LISA , 2000 . }}S. Dietrich, N. Long, and D. Dittrich. Analyzing distributed denial of service tools: The Shaft Case. In Proceedings of the USENIX System Adminstrator's Conference, LISA, 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_6"},{"key":"e_1_3_2_1_14_1","unstructured":"}}S. Ford M. Cova C. Kruegel and G. Vigna. Wepawet. http:\/\/wepawet.cs.ucsb.edu 2009. }}S. Ford M. Cova C. Kruegel and G. Vigna. Wepawet. http:\/\/wepawet.cs.ucsb.edu 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Gu G.","year":"2007","unstructured":"}} G. Gu , P. Porras , V. Yegneswaran , M. Fong , and W. Lee . BotHunter: Detecting malware infection through IDS-driven dialog correlation . In Proceedings of 16th USENIX Security Symposium , 2007 . }}G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In Proceedings of 16th USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)","author":"Gu G.","year":"2008","unstructured":"}} G. Gu , J. Zhang , and W. Lee . Botsniffer: Detecting botnet command and control channels in network traffic . In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS) , 2008 . }}G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS), 2008."},{"key":"e_1_3_2_1_17_1","unstructured":"}}K. J. Higgins. 'Aurora' exploit retooled to bypass Internet Explorer's DEP security. http:\/\/www.darkreading.com\/security\/-vulnerabilities\/showArticle.jhtml?articleID=222301436. }}K. J. Higgins. 'Aurora' exploit retooled to bypass Internet Explorer's DEP security. http:\/\/www.darkreading.com\/security\/-vulnerabilities\/showArticle.jhtml?articleID=222301436."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352603"},{"key":"e_1_3_2_1_19_1","unstructured":"}}B. Krebs. Clamping down the Clampi trojan. http:\/\/voices.washingtonpost.com\/securityfix\/2009\/09\/-clamping_down_on_clampi.html. }}B. Krebs. Clamping down the Clampi trojan. http:\/\/voices.washingtonpost.com\/securityfix\/2009\/09\/-clamping_down_on_clampi.html."},{"key":"e_1_3_2_1_20_1","unstructured":"}}Z. Liang V. N. Venkatakrishnan and R. Sekar. Isolated program execution: An application transparent approach for executing untrusted programs. }}Z. Liang V. N. Venkatakrishnan and R. Sekar. Isolated program execution: An application transparent approach for executing untrusted programs."},{"key":"e_1_3_2_1_21_1","unstructured":"}}A. Martinez-Cabrera. Malware infections double on web pages. http:\/\/articles.sfgate.com\/2010-01--26\/business\/-17836038_1_malware-infected-sites. }}A. Martinez-Cabrera. Malware infections double on web pages. http:\/\/articles.sfgate.com\/2010-01--26\/business\/-17836038_1_malware-infected-sites."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Moshchuk A.","year":"2007","unstructured":"}} A. Moshchuk , T. Bragin , D. Deville , S. D. Gribble , and H. M. Levy . SpyProxy: Execution-based detection of malicious web content . In Proceedings of 16th USENIX Security Symposium , 2007 . }}A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. SpyProxy: Execution-based detection of malicious web content. In Proceedings of 16th USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"Network and Distributed System Security Symposium","author":"Moshchuk A.","year":"2006","unstructured":"}} A. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware on the web . In Network and Distributed System Security Symposium , February 2006 . }}A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the web. In Network and Distributed System Security Symposium, February 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of LEET","author":"Nazario J.","year":"2009","unstructured":"}} J. Nazario . phoneyc : A Virtual Client Honeyport . In Proceedings of LEET , 2009 . }}J. Nazario. phoneyc: A Virtual Client Honeyport. In Proceedings of LEET, 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of 17th USENIX Security Symposium","author":"Oberheide J.","year":"2008","unstructured":"}} J. Oberheide , E. Cooke , and F. Jahanian . Cloudav: N-version antivirus in the network cloud . In Proceedings of 17th USENIX Security Symposium , 2008 . }}J. Oberheide, E. Cooke, and F. Jahanian. Cloudav: N-version antivirus in the network cloud. In Proceedings of 17th USENIX Security Symposium, 2008."},{"key":"e_1_3_2_1_26_1","unstructured":"}}N. Provos. Spybye - finding malware. http:\/\/www.monkey.org\/ \u00dcprovos\/spybye\/ 2009. }}N. Provos. Spybye - finding malware. http:\/\/www.monkey.org\/ \u00dcprovos\/spybye\/ 2009."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Provos N.","year":"2008","unstructured":"}} N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All your iframes point to us . In Proceedings of the 17th USENIX Security Symposium , 2008 . }}N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Proceedings of the 17th USENIX Security Symposium, 2008."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323132"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of 18th USENIX Security Symposium","author":"Ratanaworabhan P.","year":"2009","unstructured":"}} P. Ratanaworabhan , B. Livshits , and B. Zorn . NOZZLE: A defense against heap-spraying code injection attacks . In Proceedings of 18th USENIX Security Symposium , 2009 . }}P. Ratanaworabhan, B. Livshits, and B. Zorn. NOZZLE: A defense against heap-spraying code injection attacks. In Proceedings of 18th USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of OSDI","author":"Reis C.","year":"2006","unstructured":"}} C. Reis , J. Dunagan , H. Wang , O. Dubrovsky , and S. Esmeir . Browsershield: Vulnerability driven filtering of dynamic html . In Proceedings of OSDI , 2006 . }}C. Reis, J. Dunagan, H. Wang, O. Dubrovsky, and S. Esmeir. Browsershield: Vulnerability driven filtering of dynamic html. In Proceedings of OSDI, 2006."},{"key":"e_1_3_2_1_32_1","unstructured":"}}C. Seifert R. Steenson T. Holtz B. Yuan and M. A. Davis. Know your enemy: Malicious web servers. http:\/\/www.honeynet.org\/papers\/mws\/ 2007. }}C. Seifert R. Steenson T. Holtz B. Yuan and M. A. Davis. Know your enemy: Malicious web servers. http:\/\/www.honeynet.org\/papers\/mws\/ 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855794"},{"key":"e_1_3_2_1_35_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Wang Y.-M.","year":"2006","unstructured":"}} Y.-M. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities . In Network and Distributed System Security Symposium (NDSS) , 2006 . }}Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Network and Distributed System Security Symposium (NDSS), 2006."}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '10"},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T01:20:45Z","timestamp":1673313645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866356"}},"subtitle":["an attack-agnostic approach for preventing drive-by malware infections"],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":34,"alternative-id":["10.1145\/1866307.1866356","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866356","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}