Acknowledgement
Supported by : 미래창조과학부
References
- KISA, [Online]. Available: http://isis.kisa.or.kr/ (downloaded 2017, Jul. 18)
- ENISA Threat Landscape Report 2016, [Online]. Available: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2016(downloaded 2017, Jul. 18)
- Y. Shindo, A. Satoh, Y. Nakamura and K. Iida, "Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition," Proc. of the 2014 CoNEXT on Student Workshop, ACM, 2014.
- M. Egeke, T. Scholte, E. Kirda and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Computing Surveys (CSUR), Vol. 44, No. 2, 2012. 6.
- N. Provos, D. McNamee, P. Mavrommatis, K. Wang and N. Modadugu, "The ghost in the browser: Analysis of web-based malware," Proc. of Hotbots, pp. 4-4, Apr. 2007.
- D. H. Yoo, J. S. Kim, H. S. Cho and H. R. Park, "Analysis on Characteristics of Web-based Malware Distribution Attacks," The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 5, pp. 15-19, Apr. 2014. (in Korean)
- J. H. Oh, C. T. Im and H. C. Jeong, "Technical Trends and Response Methods of Drive-by Download," Communications of the Korean Institute of Information Scientists and Engineers, Vol. 28, No. 11, pp. 112-116, Nov. 2010. (in Korean)
- J. Ma, L. K. Saul, S. Savage and G. M. Voelker, "Identifying suspicious URLs," Proc. of ICML, pp. 681-688, Jun. 2009.
- N. P. P. Mavrommatis and M. A. R. F. Monrose, "All your iFRAMEs point to Us," Proc. of Usenix Security, pp. 1-15, Jul. 2008.
- M. Cova, C. Kruegel and G. Vigna, "Detection and analysis of drive-by-download attacks and malicious Javascript code," Proc. of WWW, pp. 281-290, Apr. 2010.
- A. Moschuk, T. Bragin, D. Deville, S. D. Gribble and H. M. Levy, "SpyProxy: execution based detection of malicious web content," Proc. of Usenix Security, pp. 27-42, Aug. 2007.
- [Online]. Available: https://www.honeynet.org/book/export/html/153(downloaded 2017, Jul. 18)
- Y. Alosefer and O. Rana, "Honeyware: a web-based low interaction client honeypot," Software Testing, Verification, and Validation Workshops (ICSTW), 2010 Third International Conference on IEEE, pp. 410-417, Apr. 2010.
- J. Nazario, "PhoneyC: a virtual client honeypot," LEET'09 Proc. of the 2nd USENIX, pp. 6-6, Apr. 2009.
- Y. Takata, M. Akiyama, T. Yagi, T. Hariu and S. Goto, "MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks," COMPSAC '15 Proceedings of the 2015 IEEE 39th Annu, pp. 444-449, Jul. 2015.
- W. G. J. Halfond and A. Orso, "Amnesia: analysis and monitoring for neutralizing sql-injection attacks," Proc. of the 20th IEEE/ACM international Conference on Automated software engineeringm," pp. 174-183, Nov. 2005.
- KISA, [Online]. Available: https://www.boho.or.kr/filedownload.do?attach_file_seq=985&attach_file_id=EpF985.pdf(downloaded 2017, Jul. 18)