MalwareLab : experimentation with cybercrime attack tools

L. Allodi, F. Massacci, V. Kotov

Research output: Contribution to conferencePaperAcademic

15 Citations (Scopus)

Abstract

Cybercrime attack tools (i.e. Exploit Kits) are reportedly responsible for the majority of attacks affecting home users. Exploit kits are traded in the black markets at different prices and advertising different capabilities and functionalities. In this paper we present our experimental approach in testing 10 exploit kits leaked from the mar- kets that we deployed in an isolated environment, our MalwareLab. The purpose of this experiment is to test these tools in terms of resiliency against changing soft- ware configurations in time. We present our experiment design and implementation, discuss challenges, lesson learned and open problems, and present a preliminary analysis of the results.
Original languageEnglish
Publication statusPublished - 2013
Externally publishedYes
Event6th Workshop on Cyber Security Experimentation and Test (CSET 2013) - Washington, D.C., United States
Duration: 12 Aug 201312 Aug 2013
Conference number: 6
https://www.usenix.org/conference/cset13

Conference

Conference6th Workshop on Cyber Security Experimentation and Test (CSET 2013)
Abbreviated titleCSET 2013
CountryUnited States
CityWashington, D.C.
Period12/08/1312/08/13
Internet address

Fingerprint Dive into the research topics of 'MalwareLab : experimentation with cybercrime attack tools'. Together they form a unique fingerprint.

  • Cite this

    Allodi, L., Massacci, F., & Kotov, V. (2013). MalwareLab : experimentation with cybercrime attack tools. Paper presented at 6th Workshop on Cyber Security Experimentation and Test (CSET 2013), Washington, D.C., United States. https://www.usenix.org/conference/cset13/workshop-program/presentation/allodi