Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we examine an alternate, counter-offensive strategy towards combating cyber-crime launched through exploit kits. Towards this goal, we survey a ...
Abstract—The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cyber- security research in the recent years ...
The results validate the hypothesis that exploit kits largely lack sophistication necessary to resist counter-offensive activities and propose the design of ...
Why Counter-Offense? ○ Equip authorized cyber-crime analysts with capabilities to: ○ Initiate take-down operations ( ...
In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a ...
Bibliographic details on EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Data flow analysis is an essential technique for understanding the complicated behavior of malicious scripts. For tracking the data flow in scripts, ...
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration, NDSS'15, San Diego, CA, USA, Feb 2015. WebWinnow: Leveraging Exploit Kit Workflows to Detect ...
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration ... exploit kit detection, exploit kit identification, and exploit execution. In the ...
People also ask
Maliheh Monshizadeh. Latest. EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. © The Data-Driven Security & Privacy Lab - University of ...