eldorado.tu-dortmund.de/server/api/core/bitstreams/b1eedafb-07e3-42e9-8e8e-509461d4c160/content
Environment
ïApproach
ïResults
ÅConclusion
htpp://www.eurecom.fr/
Van-Hau PHAM, DIMVA 2008, Paris - p 3
ÅCombining several known exploits
ÅOnly one exploit used to attack against a new target
ÅLess efficient [...] B
ÅAt each time-step, an infected
machine makes 5 attacks
Å In 2/5 times, using attack vector A,
in 3/5 times, using attack vector B
# of attacks of A and B always vary together, and they
are a function [...] FAt time = 4, another tool reuses attack vector A
FCorrelation period of trace A and B is from 1 to 3
htpp://www.eurecom.fr/
Van-Hau PHAM, DIMVA 2008, Paris - p 6
Outline
ÅIntroduction
ÅMethod and impl …