References
- Lu, Gen, and Saumya Debray. "Automatic simplification of obfuscated JavaScript code: A semantics-based approach." Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on. IEEE, 2012, http://www.cs.arizona.edu/-genlu/pub/js-deobf-web.pdf.
- Lee, Jusuk, Kyoochang Jeong, and Heejo Lee. "Detecting metamorphic malwares using code graphs." Proceedings of the 2010 ACM symposium on applied computing. ACM, 2010, http://ccs.korea.ac.kr/pds/SAC10.pdf
- Saxena, Prateek, et al. "FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications." NDSS. 2010, http://www.andrew.cmu.edu/user/ppoosank/papers/FLAX.pdf
- ECMA-262 "EMCAScript Langauge Specification", http://www.ecma-international.org/publications/standards/Ecma-262.htm
- Chugh, Ravi, et al. "Staged information flow for JavaScript." ACM Sigplan Notices. Vol. 44. No. 6. ACM, 2009, http://cseweb.ucsd.edu/-lerner/papers/pldi09-sif.pdf
- Xie, Yichen, and Alex Aiken. "Static Detection of Security Vulnerabilities in Scripting Languages." USENIX Security. Vol. 6. 2006, https://www.usenix.org/legacy/event/sec06/tech/full_papers/xie/xie_html/
- Chowdhary, Mahak, Shrutika Suri, and Mansi Bhutani. "Comparative Study of Intrusion Detection System." (2014), http://www.ijcseonline.org/pub_paper/IJCSE-00229.pdf
- Newsome, James, Brad Karp, and Dawn Song. "Polygraph: Automatically generating signatures for polymorphic worms." Security and Privacy, 2005 IEEE Symposiumon. IEEE, 2005, https://cse.sc.edu//-huangct/CSCE715F10/715presentation10.pdf
- YARA Documentation, http://yara.readthedocs.org/en/latest/index.html
- Document Object Model, http://www.w3.org/DOM/
- Charikar, Moses S. "Similarity estimation techniques from rounding algorithms." Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. ACM, 2002, http://www.cs.princeton.edu/courses/archive/spring04/cos598B/bib/CharikarEstim.pdf
- Hamming, Richard W. "Error detecting and error correcting codes." Bell System technical journal 29.2 (1950): 147-160, http://www.lee.eng.uerj.br/-gil/redesII/hamming.pdf https://doi.org/10.1002/j.1538-7305.1950.tb00463.x
- Linn, Cullen, and Saumya Debray. "Obfuscation of executable code to improve resistance to static disassembly." Proceedings of the 10th ACM conference on Computer and communications security. ACM, 2003, https://www.cs.arizona.edu/solar/papers/CCS2003.pdf
- Dong, Guowei, et al. "Detecting cross site scripting vulnerabilities introduced by HTML5." Computer Science and Software Engineering (JCSSE), 2014 11th International Joint Conference on. IEEE, 2014,
- Xu, Wei, Fangfang Zhang, and Sencun Zhu. "JStill: Mostly static detection of obfuscated malicious javascript code." Proceedings of the third ACM conference on Data and application security and privacy. ACM, 2013, http://www.cse.psu.edu/-sxz16/papers/JStill.pdf
- Fan, Wenqing, Xue Lei, and Jing An. "Obfuscated Malicious Code Detection with Path Condition Analysis." Journal of Networks 9.5 (2014): 1208-1214, http://ojs.academypublisher.com/index.php/jnw/article/viewFile/jnw090512081214/9256
- Xu, Wei, Fangfang Zhang, and Sencun Zhu. "The power of obfuscation techniques in malicious JavaScript code: A measurement study." Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on. IEEE, 2012, http://www.cse.psu.edu/-sxz16/papers/malware.pdf
- Choi, YoungHan, et al. "Automatic detection for javascript obfuscation attacks in web pages through string pattern analysis." Future Generation Information Technology. Springer Berlin Heidelberg, http://www.sersc.org/journals/IJSIA/vol4_no2_2010/2.pdf 2009. 160-172
- A. Rajaraman and J. Ullman (2010). "Mining of Massive Datasets, Ch. 3.", http://www.langtoninfo.com/web_content/9781107015357_frontmatter.pdf