[go: up one dir, main page]

Appelbaum, 2012 - Google Patents

Technical analysis of the Ultrasurf proxying software

Appelbaum, 2012

View PDF
Document ID
6973769583883484679
Author
Appelbaum J
Publication year

External Links

Snippet

Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a technical analysis of the Ultrasurf software and network. We present the results of reverse engineering the Ultrasurf client program, give an in-depth study of the …
Continue reading at research.tue.nl (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Similar Documents

Publication Publication Date Title
Steffens et al. Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
JP6106780B2 (en) Malware analysis system
Virvilis et al. Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
Starov et al. No honor among thieves: A large-scale analysis of malicious web shells
Thakur et al. Content sniffing attack detection in client and server side: A survey
Villeneuve et al. Detecting apt activity with network traffic analysis
Sood et al. Cybercrime at a scale: A practical study of deployments of HTTP-based botnet command and control panels
Praitheeshan et al. Attainable hacks on Keystore files in Ethereum wallets—A systematic analysis
Sharif Web attacks analysis and mitigation techniques
Kadir et al. An empirical analysis of android banking malware
Kouraogo et al. Attacks on Android banking applications
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Infrastructure 4Chapter
Appelbaum Technical analysis of the Ultrasurf proxying software
Foukarakis et al. Deep packet anonymization
US20230344867A1 (en) Detecting phishing pdfs with an image-based deep learning approach
Al-Khannak et al. Penetration Testing for the Cloud-Based Web Application
Kaushik et al. Investigating and Safeguarding the Web Browsers from Malicious Web Extensions
Kumar et al. A review on 0-day vulnerability testing in web application
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
APOSTOL et al. Malicious strategy: Watering hole attacks
Armin Mobile threats and the underground marketplace
Madhusudhan Cross channel scripting (XCS) attacks in web applications: detection and mitigation approaches
Hromcová et al. Anatomy of native IIS malware
Bernardo Targeted attack detection by means of free and open source solutions