Login / Signup
Torinj : Automated Exploitation Malware Targeting Tor Users
Gérard Wagener
Alexandre Dulaunoy
Radu State
Published in:
CoRR (2012)
Keyphrases
</>
user interaction
end users
daily life
rapid growth
novice users
automated tools
online communities
fully automated
user feedback
information access
reverse engineering
information overload
internet users
multiple users