In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by-download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support “customers” in avoiding detection, monitoring traffic, and managing exploits
CITATION STYLE
Kotov, V., & Massacci, F. (2013). Presentation - Anatomy of Exploit Kits. Engineering Secure Software and Systems, 181–196. Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-36563-8_13
Mendeley helps you to discover research relevant for your work.