Mnemosyne: An effective and efficient postmortem watering hole attack investigation system

J Allen, Z Yang, M Landen, R Bhat, H Grover… - Proceedings of the …, 2020 - dl.acm.org
Compromising a website that is routinely visited by employees of a targeted organization
has become a popular technique for nation-state level adversaries to penetrate an …

Catching predators at watering holes: finding and understanding strategically compromised websites

S Alrwais, K Yuan, E Alowaisheq, X Liao… - Proceedings of the …, 2016 - dl.acm.org
Unlike a random, run-of-the-mill website infection, in a strategic web attack, the adversary
carefully chooses the target frequently visited by an organization or a group of individuals to …

Website forensic investigation to identify evidence and impact of compromise

Y Takata, M Akiyama, T Yagi, T Yada… - Security and Privacy in …, 2017 - Springer
Compromised websites that redirect users to malicious websites are often used by attackers
to distribute malware. These attackers compromise popular websites and integrate them into …

TARDIS: Rolling back the clock on CMS-targeting cyber attacks

RP Kasturi, Y Sun, R Duan, O Alrawi… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Over 55% of the world's websites run on Content Management Systems (CMS).
Unfortunately, this huge user population has made CMS-based websites a high-profile …

Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks

J Zhang, C Yang, Z Xu, G Gu - … in Attacks, Intrusions, and Defenses: 15th …, 2012 - Springer
Through injecting dynamic script codes into compromised websites, attackers have widely
launched search poisoning attacks to achieve their malicious goals, such as spreading …

Investigating web defacement campaigns at large

F Maggi, M Balduzzi, R Flores, L Gu… - Proceedings of the 2018 …, 2018 - dl.acm.org
Website defacement is the practice of altering the web pages of a website after its
compromise. The altered pages, called deface pages, can negatively affect the reputation …

Retroactive identification of targeted DNS infrastructure hijacking

G Akiwate, R Sommese, M Jonker… - Proceedings of the …, 2022 - dl.acm.org
In 2019, the US Department of Homeland Security issued an emergency warning about
DNS infrastructure tampering. This alert, in response to a series of attacks against foreign …

Webcapsule: Towards a lightweight forensic engine for web browsers

C Neasbitt, B Li, R Perdisci, L Lu, K Singh… - Proceedings of the 22nd …, 2015 - dl.acm.org
Performing detailed forensic analysis of real-world web security incidents targeting users,
such as social engineering and phishing attacks, is a notoriously challenging and time …

Xb-pot: Revealing honeypot-based attacker's behaviors

R Djap, C Lim, KE Silaen… - 2021 9th International …, 2021 - ieeexplore.ieee.org
Since its introduction, the honeypot has been used by researchers to track and learn the
cyber attack into organization infrastructures. With the continuous rise of cyberattacks …

ADAM: automated detection and attribution of malicious webpages

AE Kosba, A Mohaisen, A West, T Tonn… - International Workshop on …, 2014 - Springer
Malicious webpages are a prevalent and severe threat in the Internet security landscape.
This fact has motivated numerous static and dynamic techniques to alleviate such threat …