2015
DOI: 10.2139/ssrn.2569845
|View full text |Cite
|
Sign up to set email alerts
|

Milware: The Implications of State Authored Malicious Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…One of the most significant vulnerabilities lies in software development and distribution. Malicious actors can exploit vulnerabilities in software, including those in third-party libraries or open-source components, to inject malware or backdoors (Herr & Armbrust, 2015;Martínez & Durán, 2021). This risk is compounded by the fact that a single compromised component can affect multiple products or services downstream in the supply chain.…”
Section: Vulnerability Pointsmentioning
confidence: 99%
“…One of the most significant vulnerabilities lies in software development and distribution. Malicious actors can exploit vulnerabilities in software, including those in third-party libraries or open-source components, to inject malware or backdoors (Herr & Armbrust, 2015;Martínez & Durán, 2021). This risk is compounded by the fact that a single compromised component can affect multiple products or services downstream in the supply chain.…”
Section: Vulnerability Pointsmentioning
confidence: 99%
“…Among all the analysed JavaScript-based Locky samples, the simplest and the shortest code is contained in 17 lines (693 bytes) 1 . In more recent samples, this first stage code become obfuscated using various methods.…”
Section: Locky Case Studymentioning
confidence: 99%
“…In the most cases the second stage code is hosted on web servers (sites hacked without the knowledge of their owners). The more detailed description of attack techniqes used nowadays can be found in [1] [2]. Some of them are also discussed with a QNAP NAS vulnerability case study presented in [3].…”
Section: Introductionmentioning
confidence: 99%