skip to main content
10.1007/978-3-642-36563-8_13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Anatomy of exploit kits: preliminary analysis of exploit kits as software artefacts

Published: 27 February 2013 Publication History

Abstract

In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by-download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits.

References

[1]
Internet security threat report (April 2012), http://www.symantec.com/threatreport (Checked on September 10, 2012)
[2]
Coogan, P.: Fragus exploit kit changes the business model (February 2010), http://www.symantec.com/connect/blogs/fragus-exploit-kit-changes-business-model (Checked on September 10, 2012)
[3]
Cova, M., Kruegel, C., Vigna, G.: There is no free phish: an analysis of 'free' and live phishing kits. In: Proceedings of WOOT 2008, pp. 4:1-4:8 (2008)
[4]
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of internet miscreants. In: Proceedings of CCS 2007, pp. 375- 388 (2007)
[5]
Fraser, H.: Exploring black hole exploit kit (March 2012), http://nakedsecurity.sophos.com/exploring-the-blackhole-exploit-kit (Checked on September 10, 2012)
[6]
Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A., Provos, N., Rafique, M. Z., Rajab, M. A., Rossow, C., Thomas, K., Paxson, V., Savage, S., Voelker, G. M.: Manufacturing compromise: the emergence of exploit-as-a-service. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 821-832. ACM, New York (2012)
[7]
Guido, D.: A case study of intelligence-driven defense. IEEE Security Privacy 9(6), 67-70 (2011)
[8]
Herley, C., Florencio, D.: Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In: Economics of Information Security and Privacy (2010)
[9]
Motoyama, M., McCoy, D., Savage, S., Voelker, G. M.: An analysis of underground forums. In: Proceedings of ICM 2011 (2011)
[10]
Namestnikov, Y.: IT threat evolution: Q1 2012 (May 2012), http://www.securelist.com/en/analysis/204792231/IT_Threat_Evolution_Q1_2012 (Checked on September 10, 2012)
[11]
Naranie, R.: Drive-by downloads. The web under siege (April 2009) (Checked on September 10, 2012)
[12]
Preuss, M., Diaz, V.: Exploit kits - a different view (February 2011), http://www.securelist.com/en/analysis/204792160/Exploit_Kits_A_Different_View (Checked on September 10, 2012)
[13]
Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., Zou, W.: Studying malicious websites and the underground economy on the chinese web. In: Proceedings of MIRES, pp. 225-244 (2009)

Cited By

View all
  1. Anatomy of exploit kits: preliminary analysis of exploit kits as software artefacts

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ESSoS'13: Proceedings of the 5th international conference on Engineering Secure Software and Systems
    February 2013
    228 pages
    ISBN:9783642365621
    • Editors:
    • Jan Jürjens,
    • Benjamin Livshits,
    • Riccardo Scandariato

    Sponsors

    • NESSOS: NESSoS FP7 Project
    • INRIA: Institut Natl de Recherche en Info et en Automatique

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 27 February 2013

    Author Tags

    1. exploit kits
    2. malware analysis
    3. web threats

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)TestRExInternational Journal on Software Tools for Technology Transfer (STTT)10.1007/s10009-017-0474-121:1(105-119)Online publication date: 1-Feb-2019
    • (2017)Towards Realistic Threat ModelingProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense10.1145/3140368.3140372(23-26)Online publication date: 3-Nov-2017
    • (2017)On the structure and characteristics of user agent stringProceedings of the 2017 Internet Measurement Conference10.1145/3131365.3131406(184-190)Online publication date: 1-Nov-2017
    • (2017)Ethical issues in research using datasets of illicit originProceedings of the 2017 Internet Measurement Conference10.1145/3131365.3131389(445-462)Online publication date: 1-Nov-2017
    • (2016)Exploit Kit Website Detection Using HTTP Proxy LogsProceedings of the Fifth International Conference on Network, Communication and Computing10.1145/3033288.3033354(120-125)Online publication date: 17-Dec-2016
    • (2016)Measurement of IP and network tracking behaviour of malicious websitesProceedings of the Australasian Computer Science Week Multiconference10.1145/2843043.2843358(1-8)Online publication date: 1-Feb-2016
    • (2014)Comparing Vulnerability Severity and Exploits Using Case-Control StudiesACM Transactions on Information and System Security10.1145/263006917:1(1-20)Online publication date: 15-Aug-2014
    • (2014)WebWinnowProceedings of the 4th ACM conference on Data and application security and privacy10.1145/2557547.2557575(305-312)Online publication date: 3-Mar-2014
    • (2014)Targeted Cyber AttacksundefinedOnline publication date: 21-Apr-2014

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media