首页> 外文会议>International Conference on Malicious and Unwanted Software >Protection against remote code execution exploits of popular applications in Windows
【24h】

Protection against remote code execution exploits of popular applications in Windows

机译:防止远程代码执行在Windows中的流行应用程序攻击

获取原文

摘要

The objective of Malicious Remote Code Execution Exploits is to remotely execute code transparently to the user, and without relying on user interaction, in order to infect targeted machines. This comparative study examines the effectiveness of different proactive exploit mitigation technologies included in popular endpoint security products and specialized anti-exploit tools. The study focuses on exploits of popular applications running on Windows XP SP3 with Internet Explorer (IE8). As such, the Microsoft Enhanced Mitigation Experience Toolkit (MS-EMET) is used as a reference standard for all exploit mitigation solutions. The study compares the effectiveness of endpoint security products and anti-exploit tools by separating measurements of protections in common with MS-EMET from measures of protections supplemental to MS-EMET. This is done in order to understand not just the relative competitive effectiveness of the individual products and tools but also to understand the overall capabilities of the Windows endpoint security solutions to combat the remote code execution exploit capabilities of the overall Windows malware ecosystem.
机译:恶意远程执行代码执行的目标是透明地向用户透明地执行代码,而不依赖于用户交互,以便感染目标机器。该比较研究探讨了流行的终点安全产品和专门的防爆工具中包含的不同主动开发减缓技术的有效性。该研究侧重于使用Internet Explorer(IE8)在Windows XP SP3上运行的流行应用程序的利用。因此,Microsoft增强缓解体验工具包(MS-EMET)用作所有利用缓解解决方案的参考标准。该研究通过将MS-EMET与MS-EMET的保护措施分开了与MS-EMET的常见测量来比较了端点安全产品和防爆工具的有效性。这样做是为了理解各个产品和工具的相对竞争效率,还要了解Windows Endpoint安全解决方案的整体能力,以打击整个Windows恶意软件生态系统的远程代码执行漏洞功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号