Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884395 | Digital Investigation | 2018 | 9 Pages |
Abstract
In post-mortem analysis, we found no evidence of attempted infrastructure subversion and further conclude that of the 20 vulnerable software services exploited in the CGC Final Event, half were exploited in ways unintended by the service authors. Six services were exploited due to vulnerabilities accidentally included by the authors, while an additional four were exploited via the author-intended vulnerability, but via an unanticipated path.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Michael F. Thompson, Timothy Vidas,