Abstract—Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user’s computer have become the main avenue for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect URLs that are live on the Internet. Then, fast prefiltering techniques are employed to reduce the amount of pages that need to be examined by more precise, but slower, analysis tools (such as honeyclients). While effective, these techniques require a substantial amount of resources. A key reason is that the crawler encounters many pages on the web that are benign, that is, the “toxicity ” of the stream of URLs being analyzed is low. In this ...
Abstract — Deceitful and malicious web sites pretense significant danger to desktop security, integr...
Though popularly used for safe web browsing, blacklist-based filters have funda-mental limitation in...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...
International audienceMalicious web pages that host drive-by-download exploits have become a popular...
The web is one of the most popular vectors to spread mal-ware. Attackers lure victims to visit compr...
The steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilitie...
The steady evolution of the Web has paved the way for mis-creants to take advantage of vulnerabiliti...
Today, malware is often found on legitimate web sites that have been hacked. The aim of this thesis ...
Malicious web pages have embedded within them active contents that exploit vulnerabilities in users'...
Malicious web pages are an emerging security concern on the Internet due to their popularity and the...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Internet services are more necessary part of our daily life. We rely growingly on the ease and flexi...
Most existing work to thwart malicious web pages capture maliciousness via discriminative artifacts,...
Nowadays, most of the malware authors target web browsers and their plugins in order to steal person...
Abstract — Deceitful and malicious web sites pretense significant danger to desktop security, integr...
Though popularly used for safe web browsing, blacklist-based filters have funda-mental limitation in...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...
International audienceMalicious web pages that host drive-by-download exploits have become a popular...
The web is one of the most popular vectors to spread mal-ware. Attackers lure victims to visit compr...
The steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilitie...
The steady evolution of the Web has paved the way for mis-creants to take advantage of vulnerabiliti...
Today, malware is often found on legitimate web sites that have been hacked. The aim of this thesis ...
Malicious web pages have embedded within them active contents that exploit vulnerabilities in users'...
Malicious web pages are an emerging security concern on the Internet due to their popularity and the...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Internet services are more necessary part of our daily life. We rely growingly on the ease and flexi...
Most existing work to thwart malicious web pages capture maliciousness via discriminative artifacts,...
Nowadays, most of the malware authors target web browsers and their plugins in order to steal person...
Abstract — Deceitful and malicious web sites pretense significant danger to desktop security, integr...
Though popularly used for safe web browsing, blacklist-based filters have funda-mental limitation in...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...