Abstract:
Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in sup...Show MoreMetadata
Abstract:
Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in support of this cause. During such attacks, well-designed automated applications called browser exploit packs (BEPs) are deployed on infected servers. The authors' feature-oriented study analyzes the built-in features provided by BEPs used in the successful execution of drive-by downloads.
Published in: IT Professional ( Volume: 18, Issue: 5, Sept.-Oct. 2016)
DOI: 10.1109/MITP.2016.85