Entry Antonatos:2008:PMW from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Antonatos:2008:PMW,
author = "Spiros Antonatos and Periklis Akritidis and Vinh The
Lam and Kostas G. Anagnostakis",
title = "Puppetnets: Misusing {Web} Browsers as a Distributed
Attack Infrastructure",
journal = j-TISSEC,
volume = "12",
number = "2",
pages = "12:1--12:??",
month = dec,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1455518.1455524.",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Tue Dec 23 11:58:14 MST 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Most of the recent work on Web security focuses on
preventing attacks that directly harm the browser's
host machine and user. In this paper we attempt to
quantify the threat of browsers being indirectly
misused for attacking third parties. Specifically, we
look at how the existing Web infrastructure (e.g., the
languages, protocols, and security policies) can be
exploited by malicious or subverted Web sites to
remotely instruct browsers to orchestrate actions
including denial of service attacks, worm propagation,
and reconnaissance scans. We show that attackers are
able to create powerful botnet-like infrastructures
that can cause significant damage. We explore the
effectiveness of countermeasures including anomaly
detection and more fine-grained browser security
policies.",
acknowledgement = ack-nhfb,
articleno = "12",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "distributed attacks; malicious software; Web
security",
}
Related entries
- able,
2(2)138,
9(2)181,
12(3)17,
12(3)18,
13(3)22,
13(3)24,
13(3)26,
13(3)28,
14(1)9,
16(3)10,
17(3)9,
17(3)10
- action,
2(2)177,
11(1)3,
11(4)21,
12(1)1,
12(3)19,
13(4)30,
14(1)10,
14(4)28,
16(1)3,
17(1)2,
17(4)13
- anomaly,
2(3)295,
5(3)203,
15(4)17
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- attacking,
11(3)15,
17(4)16
- attempt,
11(4)19,
12(1)5,
12(2)11,
12(4)22,
13(4)41,
14(3)27,
15(3)12,
17(4)16,
18(3)9
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)14,
11(3)15,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1,
18(2)5
- browser,
2(3)332,
8(2)153,
16(4)13
- cause,
6(4)443,
12(2)10,
12(2)11,
12(4)20,
14(1)2,
14(1)13,
17(1)2,
18(4)14
- countermeasure,
16(1)1,
17(2)6,
18(1)2,
18(1)4
- create,
12(2)11,
14(1)9,
18(1)1,
18(2)5,
18(4)13
- damage,
2(3)295,
10(4)6,
11(4)20
- denial,
15(2)6,
17(1)2
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- directly,
1(1)26,
10(2)5,
11(1)2,
13(3)27
- distributed,
2(1)34,
2(1)105,
2(2)159,
2(3)332,
4(2)103,
4(4)407,
6(1)128,
8(1)41,
9(1)1,
9(4)421,
10(2)7,
11(1)3,
11(1)4,
11(2)1,
11(3)14,
12(1)1,
12(1)2,
12(2)8,
13(2)16,
13(3)25,
14(1)3,
14(1)12,
14(3)27,
14(4)31,
15(2)6,
15(3)13,
16(4)14,
16(4)15,
17(4)13,
18(1)2,
18(2)6
- e.g.,
1(1)66,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
10(4)1,
11(4)22,
12(1)1,
12(2)10,
14(1)2,
15(2)6,
16(2)7,
16(4)14,
17(1)1,
17(3)12,
17(4)15,
18(3)9
- effectiveness,
10(4)4,
10(4)6,
11(3)12,
11(4)22,
15(3)11,
15(3)12,
17(3)9
- existing,
1(1)93,
11(1)2,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- exploited,
13(4)31,
18(2)5
- explore,
12(2)8,
13(4)31,
16(2)5
- fine-grained,
11(1)3,
15(2)9,
16(2)6,
16(4)17,
18(3)11
- focus,
10(4)2,
11(2)6,
11(3)12,
11(4)19,
12(1)3,
14(3)23,
15(4)16,
16(3)10,
18(4)13
- grained, fine-,
11(1)3,
15(2)9,
16(2)6,
18(3)11
- host,
2(2)177,
11(2)2,
11(3)16,
12(3)14,
13(4)38,
15(2)6,
15(4)16,
15(4)17
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(2)2,
11(3)14,
11(4)20,
11(4)22,
12(3)14,
12(3)19,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)5,
16(2)7,
16(4)17,
18(1)1,
18(1)4
- indirectly,
11(1)2
- infrastructure,
2(2)138,
7(1)21,
9(4)421,
10(3)11,
11(3)16,
13(4)29,
17(4)16,
18(2)7
- language,
2(1)65,
9(4)391,
9(4)421,
10(1)3,
10(2)8,
11(1)2,
11(1)4,
11(4)21,
12(1)1,
13(3)20,
13(3)24,
13(3)26,
13(3)28,
14(1)9,
15(1)2,
15(2)8,
16(1)3,
16(3)9,
16(4)17,
17(1)2,
17(1)3
- look,
2(3)269,
10(4)3
- machine,
2(2)159,
2(2)177,
2(3)230,
2(3)295,
14(1)6,
14(1)10,
14(2)18,
14(2)21,
15(2)9,
15(3)12,
16(2)7,
16(3)9,
16(4)13,
16(4)14,
17(2)8,
18(2)6,
18(3)11
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- most,
2(3)332,
9(4)391,
11(2)2,
11(3)12,
11(4)22,
12(2)8,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- paper,
1(1)66,
1(1)93,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(4)390,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)4,
11(1)2,
11(2)1,
11(2)6,
14(4)28,
14(4)32
- party,
9(4)421,
10(2)8,
10(4)3,
11(2)4,
11(2)6,
12(1)6,
13(3)22,
13(4)39,
14(4)29,
15(2)9,
17(3)9
- powerful,
1(1)93,
14(4)29,
15(2)8,
17(3)9
- preventing,
15(1)2,
15(3)13
- propagation,
10(4)1,
11(1)3,
16(2)5
- quantify,
15(3)14,
17(1)1
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(1)2,
11(4)22,
12(1)2,
14(1)7,
14(1)14,
14(4)29,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)5,
18(2)7,
18(4)13
- scans,
11(3)16,
15(2)6
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- significant,
10(3)11,
11(2)1,
13(4)36,
14(1)7,
15(1)4,
15(3)12,
17(4)16
- site,
11(2)3,
13(4)39,
14(2)21,
14(3)26,
16(4)13,
16(4)16
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
3(1)51,
11(1)2,
12(2)11,
12(3)14,
12(3)19,
14(1)8,
14(3)24,
14(4)32,
15(2)8,
17(1)1,
17(3)11
- specifically,
9(2)181,
10(3)12,
11(1)4,
11(3)16,
12(1)6,
12(3)16,
15(2)6,
15(2)8,
15(4)16,
16(4)17,
17(4)13,
18(2)5,
18(2)6,
18(3)9
- third,
9(2)181,
11(2)3,
11(2)4,
11(2)6,
13(4)31,
13(4)39,
14(4)29,
15(2)9
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- web,
1(1)66,
2(1)34,
2(4)390,
4(1)37,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
11(3)15,
12(3)17,
13(4)39,
14(2)21,
14(3)26,
16(4)13,
16(4)14,
16(4)16,
18(1)1
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
10(4)6,
11(2)2,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13
- worm,
12(2)11