Embedded Script Attacks presented at SyScan 2008

by 嵌入式 script 攻擊(中),

Tags: Security Web Malware

Summary : Traditionally, we see scripts usage limited to web applications. However, many applications
today support the use of embedded scripts in their file formats. And we are observing more
and more of such file formats being exploited by malware creators. In this presentation,
we will look at some of the new file formats being used to hide malicious scripts,
and discuss some possible ways to detect them.Scriptu8a9eu8a00u4e00u76f4u88abu8a8du70bau53eau6709u5728Webu4e0au88abu904bu7528uff0cu4f46u662fu5be6u969bu4e0auff0cu5728u4ecau5929uff0cu8a31u8a31u591au591au7684u61c9u7528u4e2du90fdu6703u4f7fu7528u5d4cu5165u5f0f
scripts (embedded scripts)u6211u5011u4e5fu89c0u5bdfu5230uff0cu60e1u610fu7a0bu5f0fu7684u88fdu9020u8005
u8d8au4f86u8d8au61c2u5f97u5229u7528u5d4cu5165u5f0fscriptu4f86u9054u6210u653bu64cau3002u5728u9019u500bu6f14u8b1bu4e2duff0cu6211u5011u6703u5e36u5927u5bb6u4e86u89e3u76eeu524du8a31u591au542bu6709u5d4cu5165u5f0fscriptu4e4bu6a94u6848u683cu5f0fuff0c
u9019u4e9bu683cu5f0fu5982u4f55u5c0eu81f4u96b1u85cfu4e4bu60e1u610fscriptuff0cu4ee5u53cau5075u6e2cu6b64u7a2eu653bu64cau4e4bu4e0du540cu6280u8853u3002