Paper Title:
Research on Hiding Technology of Web Malicious Code
  Abstract

In modern network confrontation, it is very important to improve the viability of web malicious code. According to the generation and propagation characteristics, we propose the web malicious code hidden solutions which are based on deformation and encryption. Combining with MS09002 vulnerabilities we give an application example of web Trojan hidden. Test results show that the proposed integrated solution has the better capacity of avoiding virus killing and the stronger hidden performance. The significant improvement of viability of web malicious code is very important of application.

  Info
Periodical
Chapter
Chapter 4: Engineering Information System
Edited by
Elwin Mao and Linli Xu
Pages
310-314
DOI
10.4028/www.scientific.net/AEF.1.310
Citation
D. Y. Zhang, Z. X. Wang, X. Q. Zhao, "Research on Hiding Technology of Web Malicious Code", Advanced Engineering Forum, Vol. 1, pp. 310-314, 2011
Online since
September 2011
Export
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Shan Liang Xue, Qing Yan Wei, Guang Ming Jiao, Dun Wen Zuo
Abstract:Web-based Code Management System (WCMS) is an essential tool for realizing information exchange in distant collaborative product design and...
188
Authors: Yong Qiang Zhang, Hai Bi
Abstract:HOOK and injection are advanced programming techniques. The common windows injection and HOOK techniques are introduced and analyzed in this...
424
Authors: Nan Wang
Abstract:APTCHA is an important means to improve network security and prevent hackers. Since only a simple transfigure processing and the same style....
731
Authors: Yan Yi
Chapter 6: Engineering Management Information Systems
Abstract:In order to promote the application of two dimensional barcode on mobile phone, this paper uses the popular Android technology, and...
453
Authors: Yao Tang Chang
Chapter 10: Communication, Optoelectronics and Optical Systems
Abstract:In order to overcome the vulnerability to eavesdropping on-off-keying based OCDMA scheme, a new multi-code keying reconfiguration is...
2899