In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by- download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits. © Springer-Verlag Berlin Heidelberg 2013.
Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
Massacci, Fabio
2013-01-01
Abstract
In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by- download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits. © Springer-Verlag Berlin Heidelberg 2013.File in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione



