"Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"
"Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"
According to a team of researchers from the University of Tokyo and NTT Security, attackers can conceal their malicious injection activity by inserting commands into the machine code stored in memory by the software interpreters that many programming languages use. Interpreters translate each line of human-readable software code into bytecode. The researchers successfully inserted malicious instructions into the bytecode stored in memory before execution. Since most security software does not scan bytecode, their changes went undetected.