By Topic

Server-side script polumorphism: Techniques of analysis and defense

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

It is said that more than 50% of web-based malware originates in malicious IFRAME injection attacks. But what is behind those pesky URLs? A while back, it was an easy task to find out - the code behind it was plain or just slightly obfuscated. Lately though, script encryption routines have become more and more elegant and sophisticated. As attackers deploy exploits for a wide range of vulnerable components, it becomes not only an issue of evading security products, but also a way of protecting intellectual property (0-day vulnerabilities are a ldquovaluablerdquo asset).

Published in:

Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on

Date of Conference:

7-8 Oct. 2008