共 29 条
- [1] Conti M, Gangwal A, Ruj S., On the economic significance of ransomware campaigns: A Bitcoin transactions perspective, Computers & Security, 79, pp. 162-189, (2018)
- [2] Joseph D P, Norman J., Areview and analysis of ransomware using memory forensics and its tools, Smart Innovation, Systems and Technologies 159: Smart Intelligent Computing and Applications, pp. 505-514, (2020)
- [3] Huang D Y, Aliapoulios M M, Li V G, Et al., Tracking ransomware end-to-end, Proc of 2018 IEEE Symp on Security and Privacy, pp. 618-631, (2018)
- [4] Barabosch T, Gerhards-Padilla E., Host-based code injection attacks: A popular technique used by malware, Proc of the 9th Int Conf on Malicious and Unwanted Software (MALWARE), pp. 8-17, (2014)
- [5] Choi H, Kim Y., Large-scale analysis of remote code injection attacks in android apps, Security and Communication Networks, (2018)
- [6] Srivastava A, Giffin J., Automatic discovery of parasitic malware, LNCS 6307: Proc of Int Workshop on Recent Advances in Intrusion Detection (RAID), pp. 97-117, (2010)
- [7] Snow K Z, Krishnan S, Monrose F, Et al., SHELLOS: Enablingfast detection and forensic analysis of code injection attacks, Proc of USENIX Security Symp, pp. 183-200, (2011)
- [8] Barabosch T, Eschweiler S, Gerhards-Padilla E., Bee master: Detecting host-based code injection attacks, LNCS 8550: Proc of Int Conf on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 235-254, (2014)
- [9] Wang Yi, Li Zhoujun, Guo Tao, Literal tainting method for preventing code injection attack in Web application, Journal of Computer Research and Development, 49, 11, pp. 2414-2423, (2012)
- [10] Zhang Bingqi, Sun Wei, A PHP source-code SQL injection attack detection algorithm based on taint tracking, Journal of Information Security Research, 1, 2, pp. 140-148, (2015)