"Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"

According to a team of researchers from the University of Tokyo and NTT Security, attackers can conceal their malicious injection activity by inserting commands into the machine code stored in memory by the software interpreters that many programming languages use. Interpreters translate each line of human-readable software code into bytecode. The researchers successfully inserted malicious instructions into the bytecode stored in memory before execution. Since most security software does not scan bytecode, their changes went undetected. Attackers could use this method to hide their malicious activity from most endpoint security software. This article continues to discuss the study "Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious Bytecode."

Dark Reading reports "Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"

Submitted by grigby1

Submitted by grigby1 CPVI on