{"title":"Source Code Implications for Malcode","authors":"Ken Dunham","doi":"10.1201/1086.1065898X/45654.14.5.20051101/91009.3","DOIUrl":null,"url":null,"abstract":"Abstract The advent of source code availability within the malicious code world has serious implications. The nature and volume of attacks have been changed forever as a result. This article reviews a brief history of source code implications and identifies current trends and implications of source code availability to malicious actors.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"78 1","pages":"10 - 14"},"PeriodicalIF":0.0000,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086.1065898X/45654.14.5.20051101/91009.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract The advent of source code availability within the malicious code world has serious implications. The nature and volume of attacks have been changed forever as a result. This article reviews a brief history of source code implications and identifies current trends and implications of source code availability to malicious actors.