no code implementations • 5 Aug 2014 • Joseph Gardiner, Marco Cova, Shishir Nagaraja
In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed.
Cryptography and Security
no code implementations • WWW '10: Proceedings of the 19th international conference on World wide web 2010 • Marco Cova, Christopher Kruegel, Giovanni Vigna
Our approach combines anomaly detection with emulation to automatically identify malicious Java- Script code and to support its analysis.