Abstract
Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in support of this cause. During such attacks, well-designed automated applications called browser exploit packs (BEPs) are deployed on infected servers. The authors' feature-oriented study analyzes the built-in features provided by BEPs used in the successful execution of drive-by downloads.
Original language | English |
---|---|
Article number | 7579103 |
Pages (from-to) | 18-25 |
Number of pages | 8 |
Journal | IT Professional |
Volume | 18 |
Issue number | 5 |
DOIs | |
State | Published - Sep 1 2016 |
Keywords
- browser exploit packs (BEPs)
- cybercrime
- drive-by downloads
- Internet computing
- Internet security
- targeted attacks
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Science Applications