Introduction / 1: |
Definitions and History / 1.1: |
Motivation / 1.2: |
Getting There / 2: |
Installation / 2.1: |
Explicit, Voluntary Installation / 2.1.1: |
Drive-by Downloads, User Involvement / 2.1.2: |
Drive-by Downloads, No User Involvement / 2.1.3: |
Installation via Malware / 2.1.4: |
Startup / 2.2: |
Application-Specific Startup / 2.2.1: |
GUI Startup / 2.2.2: |
System Startup / 2.2.3: |
Kernel Startup / 2.2.4: |
Defenses / 2.2.5: |
Staying There / 3: |
Avoiding Detection / 3.1: |
Basic Detection Avoidance / 3.1.1: |
Anti-Spyware / 3.1.2: |
Advanced Detection Avoidance: Rootkits / 3.1.3: |
Avoiding Uninstall / 3.2: |
Passive Avoidance / 3.2.1: |
Active Avoidance / 3.2.2: |
Keylogging / 4: |
User Space Keylogging / 4.1: |
Polling / 4.1.1: |
Event Copying / 4.1.2: |
Event Monitoring / 4.1.3: |
User Space Keylogging Defenses / 4.2: |
Authentication / 4.3: |
Phoning Home / 5: |
Push vs. Pull / 5.1: |
Finding Home / 5.2: |
Steganography / 5.3: |
Information Leaking Defenses / 5.4: |
Advertising / 6: |
Types of Advertisement / 6.1: |
Banner Advertisement / 6.1.1: |
Banner Advertisement with Pull-down Menu / 6.1.2: |
Expandable Banner Advertisement / 6.1.3: |
Pushdown Banner Advertisement / 6.1.4: |
Pop-up Advertisement / 6.1.5: |
Pop-under Advertisement / 6.1.6: |
Floating Advertisement / 6.1.7: |
Tear-back Advertisement / 6.1.8: |
In-text Advertisement / 6.1.9: |
Transition Advertisement / 6.1.10: |
Video Advertisements / 6.1.11: |
Intent and Content / 6.2: |
Advertisement Implementation / 7: |
Implementation Location / 7.1: |
Implementation on the User Machine / 7.1.1: |
Implementation in the Network / 7.1.2: |
Implementation near the User Machine / 7.1.3: |
Implementation on the Server / 7.1.4: |
Choosing Keywords / 7.2: |
Blocking Advertisements / 7.3: |
Pop-up Blocking / 7.3.1: |
General Advertisement Blocking / 7.3.2: |
Blocker Evasion and Blocker Blocking / 7.3.3: |
Tracking Users |
Cookies / 8.1: |
Other Browser-Related Tracking Methods / 8.1.1: |
User Profiling / 8.2: |
Cognitive Styles, Mood, and Personality / 8.2.1: |
Future Actions / 8.2.2: |
Demographic Information / 8.2.3: |
Social Networks / 8.2.4: |
Real World Activities / 8.2.5: |
Physical of Location / 8.2.6: |
Search Terms and keywords / 8.2.7: |
Disinterests / 8.2.8: |
Conclusion / 9: |
References |
Index |
Introduction / 1: |
Definitions and History / 1.1: |
Motivation / 1.2: |
Getting There / 2: |
Installation / 2.1: |
Explicit, Voluntary Installation / 2.1.1: |