Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382282
|View full text |Cite
|
Sign up to set email alerts
|

Vanity, cracks and malware

Abstract: Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying software patches (cracks) or license key generators (keygens) with seemingly no financial incentives. Our research shows that the distribution of cracks and keygens not only allows miscreants to generate revenue (e.g. through advertising or malware infections), but it also leads to high risks for the end-users of pirated software. We collected more… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Thus, cyber-criminals have shifted from a volume focused strategy to a more targeted approach. One such approach has been the bundling of malware with pirated software [14]. Computing equipment infected with malware at the point-of-sale or subsequently downloaded/installed by users who are willing to trade cost for security by opting for pirated software, either knowingly or unknowingly, provide cyber-criminals with an easier means of acquiring compromised targets.…”
Section: Background and Literature Review A Malware: Characteristics ...mentioning
confidence: 99%
“…Thus, cyber-criminals have shifted from a volume focused strategy to a more targeted approach. One such approach has been the bundling of malware with pirated software [14]. Computing equipment infected with malware at the point-of-sale or subsequently downloaded/installed by users who are willing to trade cost for security by opting for pirated software, either knowingly or unknowingly, provide cyber-criminals with an easier means of acquiring compromised targets.…”
Section: Background and Literature Review A Malware: Characteristics ...mentioning
confidence: 99%
“…As previously suggested, malicious websites need to balance two opposing requirements to successfully function: escaping detection tools while attracting visitors [21,22]. To attract visitors, a website needs to signal its claimed functionality to potential users by leveraging appearance, content and experience [23].…”
Section: Introductionmentioning
confidence: 99%
“…The malware programs are created for diverse purposes such as to destroy the user's data, steal important information from the users, and then demand money. This malicious activity creates a problem for the users because the antivirus cannot detect almost 33% of malware attacks [1]. Each malware has its type and its different damages to the user's computer system.…”
Section: Introductionmentioning
confidence: 99%