2016 Symposium Posters

Posters > 2016

A comparative analysis of exploit kits: How are exploit kits infecting machines?


Primary Investigator:
Research Independant

Project Members
Kaitlyn Gurule
Exploit kits are used widely among malware creators. These kits are by-passing the security features installed on computer machines and finding vulnerabilities. These vulnerabilities are being exploited and causing the machines to become infected. Analyzing these exploit kits will help to understand what the authors of these exploit kits are commonly attacking and how they are exploiting the vulnerabilities being found. The question answered in this study was how are exploit kits infecting machines? Knowing how these exploit kits are being used and how the authors are thinking in order to by-pass securities already in place may allow for newer and better methods of protection against these exploit kits.

Our annual information security symposium will take place on April 3rd and 4th, 2018.
Purdue University, West Lafayette, IN