Abstract
Cybercrime attack tools (i.e. Exploit Kits) are reportedly responsible for the majority of attacks affecting home users. Exploit kits are traded in the black markets at different prices and advertising different capabilities and functionalities. In this paper we present our experimental approach in testing 10 exploit kits leaked from the mar- kets that we deployed in an isolated environment, our MalwareLab. The purpose of this experiment is to test these tools in terms of resiliency against changing soft- ware configurations in time. We present our experiment design and implementation, discuss challenges, lesson learned and open problems, and present a preliminary analysis of the results.
Original language | English |
---|---|
Publication status | Published - 2013 |
Externally published | Yes |
Event | 6th Workshop on Cyber Security Experimentation and Test (CSET 2013) - Washington, D.C., United States Duration: 12 Aug 2013 → 12 Aug 2013 Conference number: 6 https://www.usenix.org/conference/cset13 |
Conference
Conference | 6th Workshop on Cyber Security Experimentation and Test (CSET 2013) |
---|---|
Abbreviated title | CSET 2013 |
Country/Territory | United States |
City | Washington, D.C. |
Period | 12/08/13 → 12/08/13 |
Internet address |