CS Store Search
Displaying 1-5 out of 5 total
Internet Infrastructure Security
IEEE Security & Privacy Magazine
By Jose Nazario,John Kristoff
Issue Date:July 2012
The Internet's crucial role in modern life, commerce, and government underscores the need to study the security of the protocols and infrastructure that comprise it. For years, we've focused on endpoint security and ignored infrastructure weaknesses. Recen...
Phishing by form: The abuse of form sites
Malicious and Unwanted Software, International Conference on
By Hugo Gonzalez,Kara Nance,Jose Nazario
Issue Date:October 2011
The evolution of phishing methods has resulted in a plethora of new tools and techniques to coerce users into providing credentials, generally for nefarious purposes. This paper discusses the relatively recent emergence of an evolutionary phishing techniqu...
The Blaster Worm: Then and Now
IEEE Security and Privacy
By Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, Jose Nazario
Issue Date:July 2005
In August of 2003 the Blaster worm struck the Internet, infecting at least 100,000 Microsoft Windows systems and causing millions of dollars in damages. In spite of considerable cleanup efforts, an antiworm aimed at patching systems, and a widely downloade...
WebPatrol: automated collection and replay of web-based malware scenarios
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Guofei Gu, Jianwei Zhuge, Jose Nazario, Kevin Zhijie Chen, Xinhui Han
Issue Date:March 2011
Traditional remote-server-exploiting malware is quickly evolving and adapting to the new web-centric computing paradigm. By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers ...
Where the worms aren't
Found in: Proceedings of the 4th ACM workshop on Recurring malcode (WORM '06)
By Jose Nazario
Issue Date:November 2006
In this panel we explore the reasons why there has been a dramatic decrease in worm outbreaks on the Internet. There have been a number of changes in the Internet security landscape since the major worm outbreaks of 2001 (Code Red and Nimda), with worm pop...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.