“…Some researchers have analyzed so-called brute force attacks and methods of retrofitting against them (Cho et al, 2011;Cho et al, 2012;Rashwan et al, 2011;Laccetti & Schmid, 2007). Numerous studies have also focused on vulnerabilities that have given rise to DNS hijacking attacks (Brahmasani & Sivasankar, 2013;Shulman & Waidner, 2014), cross site request forgery (Siddiqui & Verma, 2011;Jovanovic, Kirda & Kruegel, 2006;Shahriar & Zulkernine, 2010;Zeng, 2013;Feil & Nyffenegger, 2008), misconfiguration (Saeed & Elgabar, 2014;Steinke, Tundreab & Kellya, 2011), content spoofing (Jitpukdebodin, Chokngamwong & Kungpisdan, 2014;Chavan & Meshram, 2013), local file inclusion (Ami & Malav, 2013), phishing attacks (Dadkhah, Lyashenko & Jazi, 2015;Nyeste & Mayhorn, 2012), and remote file inclusion (Robledo, 2008;Srivastava, 2012). However, there are no studies on the vulnerability of remote installation on what we will term remote installation vulnerability (RIV).…”