In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by- download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits. © Springer-Verlag Berlin Heidelberg 2013.

Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts

Massacci, Fabio
2013-01-01

Abstract

In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by- download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits. © Springer-Verlag Berlin Heidelberg 2013.
2013
ESSoS 2013: Engineering Secure Software and Systems
Berlin
Springer
9783642365621
V., Kotov; Massacci, Fabio
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/67368
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 48
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact