Measuring Drive-by Download Defense in Depth (2014 paper)

Discussion in 'other security issues & news' started by MrBrian, Oct 18, 2014.

  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From http://link.springer.com/chapter/10.1007/978-3-319-11379-1_9:
    From the paper:
    Most of the security products involved are given anonymous identifiers instead of their real names.

    Paper download: hxxp://ids.cs.columbia.edu/sites/default/files/boggs_driveby_paper81.pdf .
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.