References5
1. Dabirsiaghi, A. January 5, 2008.
HTML/CSS Injections – Primitive Malicious
Code. omg.wtf.bbq. Retrieved
February 25, 2008 from http://i8jesus.com/?p=10.
2. Dabirsiaghi, A. February 25, 2008.
Improving Hackvertor: Polymorphic
JavaScript Payloads. omg.wtf.bbq. Retrieved
February 26, 2008 from
http://i8jesus.com/?p=15.
3. F-Secure Corporation, December, 2003. F-Secure
Corporation's Data Security
Summary for 2003. Retrieved February 25, 2008 from http://www.fsecure.
com/2003/.
4. Gong, F. March, 2003. Deciphering
Detection Techniques. Anomaly-Based
Intrusion Detection. Retrieved February 25, 2008 from
http://www.mcafee.com/us/local_content/white_papers/wp_ddt_anomaly.pdf.
5. Grossman, J. April, 2006. Cross-Site
Scripting Worms
and Viruses. WhiteHat.
Retrieved February 25, 2008, from http://www.netsecurity.
org/dl/articles/WHXSSThreats.pdf.
6. Grossman, J. November 27, 2007.
Inconvenient Truth blog, SE0wN3d!!1.
Retrieved February 27, 2008 from
http://jeremiahgrossman.blogspot.com/2007/11/inconvenient-truth-blogse0wn3d1.
html.
7. Hansen, R. XSS Worm Analysis and
Defense. ha.ckers.org. Retrieved February
25, 2008, from http://ha.ckers.org/xss-worms/.
8. Hansen, R. et. al. Creating and
Combating the Ultimate XSS Worm.
sla.ckers.org. Retrieved February 25, 2008 from
http://sla.ckers.org/forum/read.php?2,19143.
9. Hansen, R. June 1, 2006. Content
restrictions and XSS. ha.ckers.org. Retrieved
February 29, 2008 from http://ha.ckers.org/blog/20060601/content-restrictionsand-
xss/.
10. Heyes, G. January 21, 2008. Code Morphing.
The Spanner. Retrieved February
25, 2008 from http://www.businessinfo.co.uk/labs/morph/morph.php.
11. Higgins, K. December 19, 2007.
Google's Orkut Social Network Hacked. Dark
Reading. Retrieved February 25, 2008 from
http://www.darkreading.com/document.asp?doc_id=141761&WT.svl=news1_2.
12. Hoffman, B. and Sullivan, B. Ajax
Security. Addison-Wesley, 2007.
13. Hoffman, B. April 2, 2007. Jikto in
the wild. The HP Security Laboratory.
Retrieved February 27 from
http://portal.spidynamics.com/blogs/spilabs/archive/2007/04/02/Jikto-in-thewild.
aspx.
14. Jackson, C., Barth, A., Bortz, A.,
Shao, W., Boneh, D. Protecting Browsers from
DNS Rebinding Attacks. Retrieved February
25, 2008 from
http://crypto.stanford.edu/dns/dns-rebinding.pdf.
15. Kaplan, D. December 5, 2007. Duke University
Law School
Infiltrated by
Hackers. SC Magazine. Retrieved
February 25, 2008 from
http://www.scmagazineus.com/Duke-University-Law-School-website-infiltratedby-
hackers/article/99613/.
16. Kerckhoffs, A. 1883. La Cryptographie
Militaire. Journal Des Sciences
Militaires, IX, 5-83, 161-191.
17. Maone, G. NoScript –
JavaScript/Java/Flash blocker for a safer Firefox
experience! Retrieved February 25, 2008 from http://noscript.net/.
18. Markham, G. February 24, 2005.
Auto-Sizing IFRAMEs? Hacking for Christ.
Retrieved February 25, 2008 from
http://weblogs.mozillazine.org/gerv/archives/007610.html.
19. Rhodes, K. August 29, 2001. Code Red,
Code Red II, and SirCam Attacks
Highlight Need for Proactive Measures. United
States General Accounting
Office. Retrieved February 25, 2008 from
http://www.gao.gov/new.items/d011073t.pdf.
20. Sirdarkcat. November 8, 2007. Inside
History of hacking rsnake for fun and
pagerank. SIRDARKCAT: Security and
Programming Blog. Retrieved February
25, 2008 from http://sirdarckcat.blogspot.com/2007/11/inside-history-of-hackingrsnake-
for.html.
21. Sutton, Michael. December 31, 2006.
Web Application Security Statistics. Web
Application Security Consortium. Retrieved February 25, 2008 from
http://www.webappsec.org/projects/statistics.
22. Unknown. Spam Mimic .Retrieved
February 25, 2008, from
http://www.spammimic.com.
23. Valotta, R. Nduja Connection.
Retrieved February 25, 2008 from
http://rosario.valotta.googlepages.com/home.
24. Veness, C. SHA-1 Cryptographic Hash
Algorithm. Movable Type Scripts.
Retrieved February 25, 2008 from http://www.movabletype.
co.uk/scripts/sha1.html.
25. Zhou, Y., Cui X., Wu, B. Worm
Poisoning Technology and Application.
CNCERT/CC. Retrieved February 27, 2008 from
http://www.first.org/conference/2006/papers/xiang-cui-papers.pdf.
26. Spafford, E. The Internet Worm
Program: An Analysis. Purdue Technical Report
CSD-TR-823. Department of Computer
Sciences, Purdue University. Retrieved
No comments:
Post a Comment