A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
MỘT SỐ KỸ THUẬT GÂY RỐI, CHE DẤU MÃ ĐỘC MACRO
2018
KỶ YẾU HỘI NGHỊ KHOA HỌC CÔNG NGHỆ QUỐC GIA LẦN THỨ XI NGHIÊN CỨU CƠ BẢN VÀ ỨNG DỤNG CÔNG NGHỆ THÔNG TIN
unpublished
Nowadays, network attacks are significantly complex, varied in form and type. Especially, one of the targets that hackers exploit is the process of data exchange by using email systems. In e-government, documents are being transfer through the e-mail system, which is one of the vulnerabilities that hackers can embed malicious macros. led to cyberattacks. Normally, in order to bypass the antivirus software, a lot of obfuscation techniques are recently used. Its main ideas are based on the change
doi:10.15625/vap.2018.00046
fatcat:e5pqtic7gvhr7dhdecmoniadru