B. Eshete, Effective analysis, characterization, and detection of malicious web pages, Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, pp.355-360, 2013.
DOI : 10.1145/2487788.2487942

T. Micro, Web threats, 2012.

A. Weiss, Top 5 security threats in html5, 2011.

G. Canfora, A. N. Iannaccone, and C. A. Visaggio, Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics, Journal of Computer Virology and Hacking Techniques, vol.2, issue.3, pp.11-27, 2013.
DOI : 10.1007/s11416-013-0189-0

A. Dewald, T. Holz, and F. C. Freiling, ADSandbox, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1859-1864, 2010.
DOI : 10.1145/1774088.1774482

C. Seifert, I. Welch, and P. Komisarczuk, Identification of Malicious Web Pages with Static Heuristics, 2008 Australasian Telecommunication Networks and Applications Conference, pp.91-96, 2008.
DOI : 10.1109/ATNAC.2008.4783302

D. Canali, M. Cova, G. Vigna, and C. Kruegel, Prophiler, Proceedings of the 20th international conference on World wide web, WWW '11, pp.197-206, 2011.
DOI : 10.1145/1963405.1963436

URL : https://hal.archives-ouvertes.fr/hal-00727271

H. Choi, B. B. Zhu, and H. Lee, Detecting malicious web links and identifying their attack types, Proceedings of the 2nd USENIX conference on Web application development, pp.11-11, 2011.

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Beyond blacklists, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1245-1254, 2009.
DOI : 10.1145/1557019.1557153

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Identifying suspicious URLs, Proceedings of the 26th Annual International Conference on Machine Learning, ICML '09, pp.681-688, 2009.
DOI : 10.1145/1553374.1553462

K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, Design and Evaluation of a Real-Time URL Spam Filtering Service, 2011 IEEE Symposium on Security and Privacy, pp.447-462, 2011.
DOI : 10.1109/SP.2011.25

E. Sorio, A. Bartoli, and E. Medvet, Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features, 2013 International Conference on Availability, Reliability and Security, pp.242-247, 2013.
DOI : 10.1109/ARES.2013.31

B. Kim, C. Im, and H. Jung, Suspicious malicious web site detection with strength analysis of a javascript obfuscation, International Journal of Advanced Science & Technology, vol.26, 2011.

A. Ikinci, T. Holz, and F. Freiling, Monkey-spider: Detecting malicious websites with low-interaction honeyclients, sicherheit, 2008.

C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert, Rozzle: De-cloaking Internet Malware, 2012 IEEE Symposium on Security and Privacy, pp.443-457, 2012.
DOI : 10.1109/SP.2012.48

M. Cova, C. Kruegel, and G. Vigna, Detection and analysis of drive-by-download attacks and malicious JavaScript code, Proceedings of the 19th international conference on World wide web, WWW '10, pp.281-290, 2010.
DOI : 10.1145/1772690.1772720

A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy, Spyproxy: Execution-based detection of malicious web content, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-16, 2007.

K. Rieck, T. Krueger, and A. Dewald, Cujo, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.31-39, 2010.
DOI : 10.1145/1920261.1920267

M. T. Qassrawi and H. Zhang, Detecting Malicious Web Servers with Honeyclients, Journal of Networks, vol.6, issue.1, 2011.
DOI : 10.4304/jnw.6.1.145-152

Y. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski et al., Automated web patrol with strider honeymonkeys, Proceedings of the 2006 Network and Distributed System Security Symposium, pp.35-49, 2006.

C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, Zozzle: Low-overhead mostly static javascript malware detection, Proceedings of the Usenix Security Symposium, 2011.

A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna, Revolver: An automated approach to the detection of evasive web-based malware, USENIX Security Symposium, 2013.

J. R. Pate, R. Tairas, and N. A. Kraft, Clone evolution: a systematic review, Journal of Software: Evolution and Process, pp.261-283, 2013.
DOI : 10.1002/smr.579

URL : https://hal.archives-ouvertes.fr/inria-00622949

C. K. Roy and J. R. Cordy, A survey on software clone detection research, SCHOOL OF COMPUTING TR 2007-541, QUEEN'S UNIVERSITY, 2007.

U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, Scalable, behavior-based malware clustering, NDSS, pp.8-11, 2009.

J. Jang, D. Brumley, and S. Venkataraman, BitShred, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.309-320, 2011.
DOI : 10.1145/2046707.2046742