BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES
暂无分享,去创建一个
Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. However, until recently, these techniques were not common place in computer viruses. The CodeRed worm was a major shock to the antivirus industry since it was the first worm that spread not as a file, but solely in memory by utilizing a buffer overflow in Microsoft IIS. Many antivirus companies were unable to provide protection against CodeRed, while other companies with a wider focus on security were able to provide solutions to the relief of end users.
[1] Péter Ször. MEMORY SCANNING UNDER WINDOWS NT , 1999 .
[2] Charlotte Schubert,et al. The worm has turned. , 2004, Nature medicine.
[3] 耿志华. 五角大楼(The Pentagon) , 2002 .
[4] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.