Entry Antonatos:2008:PMW from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Antonatos:2008:PMW,
  author =       "Spiros Antonatos and Periklis Akritidis and Vinh The
                 Lam and Kostas G. Anagnostakis",
  title =        "Puppetnets: Misusing {Web} Browsers as a Distributed
                 Attack Infrastructure",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "2",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455518.1455524.",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Dec 23 11:58:14 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Most of the recent work on Web security focuses on
                 preventing attacks that directly harm the browser's
                 host machine and user. In this paper we attempt to
                 quantify the threat of browsers being indirectly
                 misused for attacking third parties. Specifically, we
                 look at how the existing Web infrastructure (e.g., the
                 languages, protocols, and security policies) can be
                 exploited by malicious or subverted Web sites to
                 remotely instruct browsers to orchestrate actions
                 including denial of service attacks, worm propagation,
                 and reconnaissance scans. We show that attackers are
                 able to create powerful botnet-like infrastructures
                 that can cause significant damage. We explore the
                 effectiveness of countermeasures including anomaly
                 detection and more fine-grained browser security
                 policies.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "distributed attacks; malicious software; Web
                 security",
}

Related entries