首页> 外文会议>International Conference on Malicious and Unwanted Software >Protection against remote code execution exploits of popular applications in Windows
【24h】

Protection against remote code execution exploits of popular applications in Windows

机译:防止Windows中流行应用程序的远程执行代码漏洞

获取原文

摘要

The objective of Malicious Remote Code Execution Exploits is to remotely execute code transparently to the user, and without relying on user interaction, in order to infect targeted machines. This comparative study examines the effectiveness of different proactive exploit mitigation technologies included in popular endpoint security products and specialized anti-exploit tools. The study focuses on exploits of popular applications running on Windows XP SP3 with Internet Explorer (IE8). As such, the Microsoft Enhanced Mitigation Experience Toolkit (MS-EMET) is used as a reference standard for all exploit mitigation solutions. The study compares the effectiveness of endpoint security products and anti-exploit tools by separating measurements of protections in common with MS-EMET from measures of protections supplemental to MS-EMET. This is done in order to understand not just the relative competitive effectiveness of the individual products and tools but also to understand the overall capabilities of the Windows endpoint security solutions to combat the remote code execution exploit capabilities of the overall Windows malware ecosystem.
机译:恶意远程执行代码漏洞的目的是对用户透明地远程执行代码,而无需依赖用户交互,以感染目标计算机。这项比较研究检查了流行的端点安全产品和专门的反漏洞利用工具中所包含的各种主动式漏洞利用缓解技术的有效性。这项研究的重点是利用Internet Explorer(IE8)在Windows XP SP3上运行的流行应用程序的利用。因此,Microsoft增强的缓解经验工具包(MS-EMET)被用作所有漏洞缓解解决方案的参考标准。该研究通过将与MS-EMET共同的保护措施与对MS-EMET的保护措施分开来比较端点安全产品和反利用工具的有效性。这样做是为了不仅了解各个产品和工具的相对竞争有效性,而且还了解Windows终结点安全解决方案与总体Windows恶意软件生态系统的远程代码执行利用功能作斗争的总体功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号