Presentation | 2017-07-14 A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota, Kouichirou Okada, Akira Yamada, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many cases, a package called Exploit Kit, identifying clients' vulnerabilities and exploiting them to run a malicious code are used. In this paper, we propose a new method to estimate the active period of Exploit Kits, by extracting specific strings in the Kit. We choose RIG Exploit Kit as an example of Exploit Kit and evaluate our proposal on a security software's trace. We confirm that the result fits with the other security reports about RIG Exploit Kit. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Web-based cyber attack / Drive-by Download / RIG Exploit Kit / Web access log |
Paper # | ISEC2017-16,SITE2017-8,ICSS2017-15,EMM2017-19 |
Date of Issue | 2017-07-07 (ISEC, SITE, ICSS, EMM) |
Conference Information | |
Committee | SITE / EMM / ISEC / ICSS / IPSJ-CSEC / IPSJ-SPT |
---|---|
Conference Date | 2017/7/14(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | Hitoshi Okada(NII) / Keiichi Iwamura(TUC) / Kazuto Ogawa(NHK) / Yoshiaki Shiraishi(Kobe Univ.) |
Vice Chair | Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.) / Hirohisa Hioki(Kyoto Univ.) / Minoru Kuribayashi(Okayama Univ.) / Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT) / Takeshi Ueda(Mitsubishi Electric) / Hiroki Takakura(NII) |
Secretary | Tetsuya Morizumi(Gifu Shotoku Gakuen Univ.) / Masaru Ogawa(Tokyo Univ. of the Arts) / Hirohisa Hioki(Shizuoka Univ.) / Minoru Kuribayashi(Tokyo Metropolitan Univ.) / Atsushi Fujioka(Tohoku Univ.) / Shiho Moriai(Tokai Univ.) / Takeshi Ueda(Yokohama National Univ.) / Hiroki Takakura(NTT) |
Assistant | Akiyoshi Kabeya(Chiba Univ.) / Hisanori Kato(KDDI) / Kan Hyonho(NIT, Tokyo) / Harumi Murata(Tyukyo Univ.) / Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ) / Takahiro Kasama(NICT) / Akira Yamada(KDDI labs.) |
Paper Information | |
Registration To | Technical Committee on Social Implications of Technology and Information Ethics / Technical Committee on Enriched MultiMedia / Technical Committee on Information Security / Technical Committee on Information and Communication System Security / Special Interest Group on Computer Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments |
Sub Title (in English) | |
Keyword(1) | Web-based cyber attack |
Keyword(2) | Drive-by Download |
Keyword(3) | RIG Exploit Kit |
Keyword(4) | Web access log |
1st Author's Name | Ichiro Shimada |
1st Author's Affiliation | KOZO KEIKAKU ENGINEERING Inc(KKE) |
2nd Author's Name | Toshifumi Oota |
2nd Author's Affiliation | KOZO KEIKAKU ENGINEERING Inc(KKE) |
3rd Author's Name | Kouichirou Okada |
3rd Author's Affiliation | SecureBrain Corporation(SecureBrain) |
4th Author's Name | Akira Yamada |
4th Author's Affiliation | KDDI Research, Inc.(KDDI Research) |
Date | 2017-07-14 |
Paper # | ISEC2017-16,SITE2017-8,ICSS2017-15,EMM2017-19 |
Volume (vol) | vol.117 |
Number (no) | ISEC-125,SITE-126,ICSS-127,EMM-128 |
Page | pp.pp.33-38(ISEC), pp.33-38(SITE), pp.33-38(ICSS), pp.33-38(EMM), |
#Pages | 6 |
Date of Issue | 2017-07-07 (ISEC, SITE, ICSS, EMM) |