• Stars
    star
    154
  • Rank 242,045 (Top 5 %)
  • Language
  • Created about 9 years ago
  • Updated about 9 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

awesome security paper

sec-paper

awesome security papers.

โ”œโ”€โ”€ APT
โ”‚ย ย  โ”œโ”€โ”€ A-Formal-Understanding-about-APT-Infection.pdf
โ”‚ย ย  โ””โ”€โ”€ Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains.pdf
โ”œโ”€โ”€ Binvul
โ”‚ย ย  โ”œโ”€โ”€ Some Vulnerabilities Are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild.pdf
โ”‚ย ย  โ”œโ”€โ”€ The Attack of the Clones- A Study of the Impact of Shared Code on Vulnerability Patching.pdf
โ”‚ย ย  โ””โ”€โ”€ ZigZag- Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.pdf
โ”œโ”€โ”€ Code review
โ”‚ย ย  โ”œโ”€โ”€ Automatic Detection and Repair of Input Validation and Sanitization Bugs.pdf
โ”‚ย ย  โ”œโ”€โ”€ Behind an Application Firewall, Are We Safe from SQL Injection Attacks.pdf
โ”‚ย ย  โ”œโ”€โ”€ Code Reuse Attacks in PHP- Automated POP Chain Generation.pdf
โ”‚ย ย  โ”œโ”€โ”€ Dynamic PHP web-application analysis.pdf
โ”‚ย ย  โ”œโ”€โ”€ EKHUNTER- A Counter-Offensive Toolkit for Exploit Kit Infiltration.pdf
โ”‚ย ย  โ”œโ”€โ”€ Experience Report- An Empirical Study of PHP Security Mechanism Usage.pdf
โ”‚ย ย  โ”œโ”€โ”€ Saner- Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.pdf
โ”‚ย ย  โ”œโ”€โ”€ Simulation of Built-in PHP Features for Precise Static Code Analysis.pdf
โ”‚ย ย  โ”œโ”€โ”€ Software Verification and Validation Laboratory- Black-box SQL Injection Testing- Technical Report.pdf
โ”‚ย ย  โ”œโ”€โ”€ Static Detection of Second-Order Vulnerabilities in Web Applications.pdf
โ”‚ย ย  โ”œโ”€โ”€ Static and Dynamic Analysis for PHP Security.pdf
โ”‚ย ย  โ””โ”€โ”€ WAFA- Fine-grained Dynamic Analysis of Web Applications.pdf
โ”œโ”€โ”€ Machine learning
โ”‚ย ย  โ”œโ”€โ”€ ASwatch- An AS Reputation System to Expose Bulletproof Hosting ASes.pdf
โ”‚ย ย  โ”œโ”€โ”€ An Empirical Analysis of Malware Blacklists.pdf
โ”‚ย ย  โ”œโ”€โ”€ An SVM-based machine learning method for accurate internet traffic classification.pdf
โ”‚ย ย  โ”œโ”€โ”€ Anagram- A Content Anomaly Detector Resistant to Mimicry Attack.pdf
โ”‚ย ย  โ”œโ”€โ”€ Characterizing Google Hacking- A First Large-Scale Quantitative Study.pdf
โ”‚ย ย  โ”œโ”€โ”€ Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method.pdf
โ”‚ย ย  โ”œโ”€โ”€ Detecting Malicious Landing Pages in Malware Distribution Networks.pdf
โ”‚ย ย  โ”œโ”€โ”€ Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.pdf
โ”‚ย ย  โ”œโ”€โ”€ Developing Security Reputation Metrics for Hosting Providers.pdf
โ”‚ย ย  โ”œโ”€โ”€ From Throw-Away Traffic to Bots- Detecting the Rise of DGA-Based Malware.pdf
โ”‚ย ย  โ”œโ”€โ”€ Machine Learning Classification over Encrypted Data.pdf
โ”‚ย ย  โ”œโ”€โ”€ PoisonAmplifier- A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.pdf
โ”‚ย ย  โ”œโ”€โ”€ Stickler- Defending Against Malicious CDNs in an Unmodified Browser.pdf
โ”‚ย ย  โ””โ”€โ”€ TrueClick- Automatically Distinguishing Trick Banners from Genuine Download Links.pdf
โ”œโ”€โ”€ Mobile
โ”‚ย ย  โ”œโ”€โ”€ A Study of Android Application Security.pdf
โ”‚ย ย  โ”œโ”€โ”€ Finding Unknown Malice in 10 Seconds- Mass Vetting for New Threats at the Google-Play Scale.pdf
โ”‚ย ย  โ”œโ”€โ”€ Privacy Implications of Presence Sharing in Mobile Messaging Applications.pdf
โ”‚ย ย  โ””โ”€โ”€ What is Wrecking Your Data Plan? A Measurement Study of Mobile Web Overhead.pdf
โ”œโ”€โ”€ NLP
โ”‚ย ย  โ”œโ”€โ”€ A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification.pdf
โ”‚ย ย  โ”œโ”€โ”€ Breaking Bad- Detecting malicious domains using word segmentation.pdf
โ”‚ย ย  โ”œโ”€โ”€ DSpin- Detecting Automatically Spun Content on the Web.pdf
โ”‚ย ย  โ”œโ”€โ”€ Detecting Unknown Network Attacks Using Language Models.pdf
โ”‚ย ย  โ”œโ”€โ”€ Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques.pdf
โ”‚ย ย  โ””โ”€โ”€ Metaphor Detection in Discourse.pdf
โ”œโ”€โ”€ Password
โ”‚ย ย  โ””โ”€โ”€ OMEN- Faster Password Guessing Using an Ordered Markov Enumerator.pdf
โ”œโ”€โ”€ Phishing
โ”‚ย ย  โ”œโ”€โ”€ A Framework for Predicting Phishing Websites using Neural Networks  .pdf
โ”‚ย ย  โ”œโ”€โ”€ A Lexical Approach for Classifying Malicious URLs.pdf
โ”‚ย ย  โ”œโ”€โ”€ An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.pdf
โ”‚ย ย  โ”œโ”€โ”€ An efficacious method for detecting phishing webpages through target domain identification.pdf
โ”‚ย ย  โ”œโ”€โ”€ Beyond Blacklists- Learning to Detect Malicious Web Sites from Suspicious URLs.pdf
โ”‚ย ย  โ”œโ”€โ”€ Cluster-Oriented Ensemble Classifiers for Intelligent Malware Detection.pdf
โ”‚ย ย  โ”œโ”€โ”€ Cross-project Defect Prediction.pdf
โ”‚ย ย  โ”œโ”€โ”€ Detecting Phishing Emails the Natural Language Way.pdf
โ”‚ย ย  โ”œโ”€โ”€ Gangeshwari_Phising_Review+Paper.pdf
โ”‚ย ย  โ”œโ”€โ”€ Geo-Phisher- The Design of a Global Phishing Trend Visualization Tool.pdf
โ”‚ย ย  โ”œโ”€โ”€ Large-Scale Automatic Classification of Phishing Pages.pdf
โ”‚ย ย  โ”œโ”€โ”€ Lexical Feature Based Phishing URL Detection Using Online Learning.pdf
โ”‚ย ย  โ”œโ”€โ”€ Multi-label rules for phishing classification.pdf
โ”‚ย ย  โ”œโ”€โ”€ On the Character of Phishing URLs- Accurate and Robust Statistical Learning Classifiers๏ฟฝ\210\227.pdf
โ”‚ย ย  โ”œโ”€โ”€ PREDICTION OF PHISHING WEBSITES USING CLASSIFICATION ALGORITHMS BASED ON WEIGHT OF WEB PAGES CHARACTERISTICS (1).doc
โ”‚ย ย  โ”œโ”€โ”€ PREDICTION OF PHISHING WEBSITES USING CLASSIFICATION ALGORITHMS BASED ON WEIGHT OF WEB PAGES CHARACTERISTICS.doc
โ”‚ย ย  โ”œโ”€โ”€ Parameters of Genetic Algorithm with Optimization for Phishing Detection.pdf
โ”‚ย ย  โ”œโ”€โ”€ PhishAri- Automatic Realtime Phishing Detection on Twitter.pdf
โ”‚ย ย  โ”œโ”€โ”€ PhishDef- URL Names Say It All.pdf
โ”‚ย ย  โ”œโ”€โ”€ PhishNet- Predictive Blacklisting to Detect Phishing Attacks.pdf
โ”‚ย ย  โ”œโ”€โ”€ Phishing Detection Using Traffic Behavior, Spectral Clustering, and Random Forests .pdf
โ”‚ย ย  โ”œโ”€โ”€ Phishing URL detection using URL Ranking .pdf
โ”‚ย ย  โ”œโ”€โ”€ Phishing Website Detection Fuzzy System Modelling.pdf
โ”‚ย ย  โ”œโ”€โ”€ Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies.pdf
โ”‚ย ย  โ”œโ”€โ”€ Text-Based Phishing Detection Using A Simulation Model.pdf
โ”‚ย ย  โ”œโ”€โ”€ Towards Building a Word Similarity Dictionary for Personality Bias Classification of Phishing Email Contents .pdf
โ”‚ย ย  โ”œโ”€โ”€ Towards building a word similarity dictionary for personality bias classification of phishing email contents.pdf
โ”‚ย ย  โ”œโ”€โ”€ Using Uncleanliness to Predict Future Botnet Addresses.pdf
โ”‚ย ย  โ”œโ”€โ”€ Utilisation of website logo for phishing detection.pdf
โ”‚ย ย  โ””โ”€โ”€ Visual-Similarity-Based Phishing Detection.pdf
โ”œโ”€โ”€ Social
โ”‚ย ย  โ”œโ”€โ”€ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions.pdf
โ”‚ย ย  โ”œโ”€โ”€ Are You Sure You Want to Contact Us.pdf
โ”‚ย ย  โ”œโ”€โ”€ Real-Time Entity-Based Event Detection for Twitter.pdf
โ”‚ย ย  โ””โ”€โ”€ Vulnerability Disclosure in the Age of Social Media- Exploiting Twitter for Predicting Real-World Exploits.pdf
โ”œโ”€โ”€ Spam
โ”‚ย ย  โ”œโ”€โ”€ Drops for Stuff- An Analysis of Reshipping Mule Scams.pdf
โ”‚ย ย  โ”œโ”€โ”€ That Ain't You- Blocking Spearphishing Emails Before They Are Sent.pdf
โ”‚ย ย  โ”œโ”€โ”€ Transductive Link Spam Detection.pdf
โ”‚ย ย  โ””โ”€โ”€ WE KNOW IT BEFORE YOU DO- PREDICTING MALICIOUS DOMAINS.pdf
โ”œโ”€โ”€ WAF
โ”‚ย ย  โ””โ”€โ”€ Reliable Machine Learning Algorithms for Intrusion Detection Systems.pdf
โ”œโ”€โ”€ Web malware
โ”‚ย ย  โ”œโ”€โ”€ Ad Injection at Scale- Assessing Deceptive Advertisement Modifications.pdf
โ”‚ย ย  โ”œโ”€โ”€ Analyzing and Defending Against Web-based Malware.pdf
โ”‚ย ย  โ”œโ”€โ”€ AutoBLG- Automatic URL Blacklist Generator Using Search Space Expansion and Filters.pdf
โ”‚ย ย  โ”œโ”€โ”€ Comparisons of machine learning techniques for detecting malicious webpages.pdf
โ”‚ย ย  โ”œโ”€โ”€ EKHUNTER- A Counter-Offensive Toolkit for Exploit Kit Infiltration.pdf
โ”‚ย ย  โ”œโ”€โ”€ Eyes of a Human, Eyes of a Program- Leveraging Different Views of the Web for Analysis and Detection.pdf
โ”‚ย ย  โ”œโ”€โ”€ JSOD- JavaScript obfuscation detector.pdf
โ”‚ย ย  โ”œโ”€โ”€ Measuring Drive-by Download Defense in Depth.pdf
โ”‚ย ย  โ”œโ”€โ”€ Meerkat-  Detecting Website Defacements through Image-based Object Recognition.pdf
โ”‚ย ย  โ”œโ”€โ”€ Paint it Black- Evaluating the Effectiveness of Malware Blacklists.pdf
โ”‚ย ย  โ”œโ”€โ”€ The Ghost In The Browser Analysis of Web-based Malware.pdf
โ”‚ย ย  โ”œโ”€โ”€ Understanding Malvertising Through Ad-Injecting Browser Extensions.pdf
โ”‚ย ย  โ”œโ”€โ”€ WebWinnow- Leveraging Exploit Kit Workflows to Detect Malicious URLs.pdf
โ”‚ย ย  โ”œโ”€โ”€ WebWitness- Investigating, Categorizing, and Mitigating Malware Download Paths.pdf
โ”‚ย ย  โ””โ”€โ”€ Your Reputation Precedes You- History, Reputation, and the Chrome Malware Warning.pdf
โ””โ”€โ”€ Websec
    โ”œโ”€โ”€ Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
    โ”œโ”€โ”€ High-speed web attack detection through extracting exemplars from HTTP traffic.pdf
    โ”œโ”€โ”€ May I? - Content Security Policy Endorsement for Browser Extensions.pdf
    โ”œโ”€โ”€ Web Attack Detection Using IDS*.pdf
    โ””โ”€โ”€ Why Is CSP Failing? Trends and Challenges in CSP Adoption .pdf