International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Characterizing Google Hacking: A First Large-Scale Quantitative Study

Download177 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_46,
        author={Jialong Zhang and Jayant Notani and Guofei Gu},
        title={Characterizing Google Hacking: A First Large-Scale Quantitative Study},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Vulnerability Google Hacking Google Dork},
        doi={10.1007/978-3-319-23829-6_46}
    }
    
  • Jialong Zhang
    Jayant Notani
    Guofei Gu
    Year: 2015
    Characterizing Google Hacking: A First Large-Scale Quantitative Study
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_46
Jialong Zhang1,*, Jayant Notani1,*, Guofei Gu1,*
  • 1: Texas A&M University
*Contact email: jialong@cse.tamu.edu, jayant.notani.93@gmail.com, guofei@cse.tamu.edu

Abstract

Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnerabilities are typically targeted by Google Hacking? What kind of vulnerabilities usually have a large victim population? What is the impact of Google Hacking and how easy to defend against Google Hacking?).