2019 Seventh International Symposium on Computing and Networking (CANDAR) 2019
DOI: 10.1109/candar.2019.00012
|View full text |Cite
|
Sign up to set email alerts
|

Threat Analysis of Fake Virus Alerts Using WebView Monitor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…On mobile devices, attacks redirect the users to unwanted websites by unwanted page transition. Figure 1, adapted from [12], shows the flow diagram of an attack that redirects a user to unwanted websites. The steps of the attack are described as follows:…”
Section: Attacks Of Redirecting a User To Unwanted Websitesmentioning
confidence: 99%
See 4 more Smart Citations
“…On mobile devices, attacks redirect the users to unwanted websites by unwanted page transition. Figure 1, adapted from [12], shows the flow diagram of an attack that redirects a user to unwanted websites. The steps of the attack are described as follows:…”
Section: Attacks Of Redirecting a User To Unwanted Websitesmentioning
confidence: 99%
“…According to this flow diagram, an attack that redirects a user to an unwanted website uses multiple malicious websites such as the landing site, intermediate site, and unwanted website. In addition, the URL of intermediate site 2 is generated by executing the JavaScript code of intermediate site 1 by either of the following two operations [12].…”
Section: Attacks Of Redirecting a User To Unwanted Websitesmentioning
confidence: 99%
See 3 more Smart Citations