TECH spyware raid: the PEA matrix
Abstract
Recommendations
Now that we are all so well-educated about spyware, can we put the bad guys out of business?
SIGUCCS '06: Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundariesThe phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the ...
A review of spyware campaigns and strategies to combat them
InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum developmentWhile they seem very similar, often using the same tools and techniques, spyware installations are carried out for very different reasons than traditional malware attacks. Consequently, different strategies must be used to fight them. Malware is usually ...
User Confidence--and the Software Developer
Spyware and other widespread security threats are undermining users' confidence in the Internet. The authors, recently inundated with spyware, discuss how they are handling this and give specific advice on four products that can help you.
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Cynthia Murnan,
- Kelly Wainwright,
- Program Chair:
- Chris Jones
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 153Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in