MOORE, Tyler; CLAYTON, Richard - In: Communications & Strategies 1 (2011) 81, pp. 45-68
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed and categorized, analysis of the methods used by attackers to identify targets has remained anecdotal. In this paper,...