Appelbaum, 2012 - Google Patents
Technical analysis of the Ultrasurf proxying softwareAppelbaum, 2012
View PDF- Document ID
- 6973769583883484679
- Author
- Appelbaum J
- Publication year
External Links
Snippet
Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a technical analysis of the Ultrasurf software and network. We present the results of reverse engineering the Ultrasurf client program, give an in-depth study of the …
- 238000004458 analytical method 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Steffens et al. | Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. | |
JP6106780B2 (en) | Malware analysis system | |
Virvilis et al. | Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? | |
Starov et al. | No honor among thieves: A large-scale analysis of malicious web shells | |
Thakur et al. | Content sniffing attack detection in client and server side: A survey | |
Villeneuve et al. | Detecting apt activity with network traffic analysis | |
Sood et al. | Cybercrime at a scale: A practical study of deployments of HTTP-based botnet command and control panels | |
Praitheeshan et al. | Attainable hacks on Keystore files in Ethereum wallets—A systematic analysis | |
Sharif | Web attacks analysis and mitigation techniques | |
Kadir et al. | An empirical analysis of android banking malware | |
Kouraogo et al. | Attacks on Android banking applications | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Infrastructure | 4Chapter | |
Appelbaum | Technical analysis of the Ultrasurf proxying software | |
Foukarakis et al. | Deep packet anonymization | |
US20230344867A1 (en) | Detecting phishing pdfs with an image-based deep learning approach | |
Al-Khannak et al. | Penetration Testing for the Cloud-Based Web Application | |
Kaushik et al. | Investigating and Safeguarding the Web Browsers from Malicious Web Extensions | |
Kumar et al. | A review on 0-day vulnerability testing in web application | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
APOSTOL et al. | Malicious strategy: Watering hole attacks | |
Armin | Mobile threats and the underground marketplace | |
Madhusudhan | Cross channel scripting (XCS) attacks in web applications: detection and mitigation approaches | |
Hromcová et al. | Anatomy of native IIS malware | |
Bernardo | Targeted attack detection by means of free and open source solutions |