StopBadware focuses on Web-based malware, but one of our strengths is that we work with a diverse community of security experts whose areas of expertise often extend beyond our own. Our friends and research contacts at SMU are presenting a paper at Financial Cryptography 2014's Bitcoin research workshop in Barbados next week; they'll be discussing empirical analysis of denial-of-service attacks in the Bitcoin ecosystem.
At StopBadware, it's important to us to measure how different parts of the Web are responding to malware. One of the ways we do this is to look at data about users who ignore malware warnings. For instance: what kinds of content do Web users most often insist are not malicious?
The following is a breakdown of the top kinds of sites for which Firefox users clicked through "Reported attack site" warnings in 2013.
Last month marked four years since StopBadware spun off from Harvard’s Berkman Center for Internet and Society with support from Google, Mozilla, and PayPal. StopBadware’s staff and leadership have worked diligently these past years to grow our core programs and ensure we have the support to continue advancing our mission. It’s been a challenge every step of the way, but we’re making progress.
StopBadware’s data sharing program has been up and running since the end of September 2013. Last month, the program passed 1 million event reports. One of our goals for the program is to be able to facilitate high-quality academic research on malware. Marie Vasek, a doctoral student at SMU and StopBadware’s own operations technologist, started analyzing DSP data shortly before the new year.