Alexa, the Web Information Company. Global Top Sites (September 2008),
http://alexa.com/site/ds/top_sites?ts_mode=global
Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In: USENIX Security Symposium (2007)
Google Scholar
Anonymous. Comment about posting “Good ol’ #CCpower” on honeyblog (June 2008),
http://honeyblog.org/archives/194-CCpower-Only-Scam.html
AutoIt Script Home Page (2009),
http://www.autoitscript.com/
Chandrasekaran, M., Chinchani, R., Upadhyaya, S.: PHONEY: Mimicking User Response to Detect Phishing Attacks. In: Symposium on World of Wireless, Mobile and Multimedia Networks, WoWMoM (2006)
Google Scholar
Choi, T., Son, S., Gouda, M., Cobb, J.: Pharewell to Phishing. In: Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS (2008)
Google Scholar
Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-Side Defense Against Web-Based Identity Theft. In: Network and Distributed System Security Symposium, NDSS (2004)
Google Scholar
Dhamija, R., Tygar, J.D.: Battle Against Phishing: Dynamic Security Skins. In: Symposium on Usable Privacy and Security, SOUPS (2005)
Google Scholar
Finjan: Malicious Page of the Month (April 2008),
http://www.finjan.com/Content.aspx?id=1367
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An Inquiry Into the Nature and Causes of the Wealth of Internet Miscreants. In: Conference on Computer and Communications Security, CCS (2007)
Google Scholar
Gajek, S., Sadeghi, A.-R.: A Forensic Framework for Tracing Phishers. In: IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden (August 2007)
Google Scholar
Herley, C., Florencio, D.: How To Login From an Internet Cafe Without Worrying About Keyloggers. In: Symposium on Usable Privacy and Security, SOUPS (2006)
Google Scholar
Holz, T., Engelberth, M., Freiling, F.: Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. Technical Report TR-2008-006, University of Mannheim (2008)
Google Scholar
Internet Crime Complaint Center (IC3). 2008 Internet Crime Report (March 2009),
http://www.ic3.gov/media/annualreports.aspx
Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In: Conference on Computer and Communications Security, CCS (2008)
Google Scholar
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based Spyware Detection. In: USENIX Security Symposium (2006)
Google Scholar
Linn, C., Debray, S.: Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In: Conference on Computer and Communications Security, CCS (2003)
Google Scholar
MaxMind LLC. MaxMind GeoIP (August 2008),
http://www.maxmind.com/app/ip-location
Luhn, H.P.: Computer for Verifying Numbers (August 1960) U.S. Patent 2,950,048
Google Scholar
Martin, J., Thomas, R.: The underground economy: priceless. USENIX; login: 31(6) (December 2006)
Google Scholar
McCune, J.M., Perrig, A., Reiter, M.K.: Bump in the Ether: A Framework for Securing Sensitive User Input. In: USENIX Annual Technical Conference (2006)
Google Scholar
Microsoft. Protected Storage (Pstore), Microsoft Developer Network (MSDN) (August 2008)
Google Scholar
Moser, A., Kruegel, C., Kirda, E.: Exploring Multiple Execution Paths for Malware Analysis. In: IEEE Symposium on Security and Privacy (2007)
Google Scholar
Moser, A., Kruegel, C., Kirda, E.: Limits of Static Analysis for Malware Detection. In: Annual Computer Security Applications Conference, ACSAC (2007)
Google Scholar
Newsome, J., Song, D.X.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Network and Distributed System Security Symposium, NDSS (2005)
Google Scholar
Popov, I.V., Debray, S.K., Andrews, G.R.: Binary Obfuscation Using Signals. In: USENIX Security Symposium (2007)
Google Scholar
The Honeynet Project. Know Your Enemy: Learning About Security Threats, 2nd edn. Addison-Wesley Longman (2004)
Google Scholar
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All Your iFRAMEs Point to Us. In: USENIX Security Symposium (2008)
Google Scholar
Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. SIGCOMM Comput. Commun. Rev. 36(4), 291–302 (2006)
CrossRef
Google Scholar
SecureWorks. PRG Trojan (June 2007),
http://www.secureworks.com/research/threats/prgtrojan/
SecureWorks. Coreflood Report (August. 2008),
http://www.secureworks.com/research/threats/coreflood-report/
Stahlberg, M.: The Trojan Money Spinner. In: Virus Bulletin Conference (2007)
Google Scholar
Symantec: Global Internet Security Threat Report: Trends for July – December 07 (April 2008)
Google Scholar
Symantec. Report on the Underground Economy July 07 – June 08 (November 2008)
Google Scholar
Wang, X., Li, Z., Li, N., Cho, J.Y.: PRECIP: Towards Practical and Retrofittable Confidential Information Protection. In: Network and Distributed System Security Symposium, NDSS (2008)
Google Scholar
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: Network and Distributed System Security Symposium, NDSS (2006)
Google Scholar
Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy Magazine 5(2), 32–39 (2007)
CrossRef
Google Scholar
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In: Conference on Computer and Communications Security, CCS (2007)
Google Scholar