Implementing of Malicious Execution Mechanisms in VBA and OOXML
Suho Son, Moonseong Kim, Journal of Internet Computing and Services, Vol. 26, No. 6, pp. 23-31, Dec. 2025
Keywords: VBA, OOXML, Imperative Attack, Declarative Attack, Command Usurping, Remote Template, OLE Object
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Son, S. & Kim, M. (2025). Implementing of Malicious Execution Mechanisms in VBA and OOXML. Journal of Internet Computing and Services, 26(6), 23-31. DOI: 10.7472/jksii.2025.26.6.23.
[IEEE Style]
S. Son and M. Kim, "Implementing of Malicious Execution Mechanisms in VBA and OOXML," Journal of Internet Computing and Services, vol. 26, no. 6, pp. 23-31, 2025. DOI: 10.7472/jksii.2025.26.6.23.
[ACM Style]
Suho Son and Moonseong Kim. 2025. Implementing of Malicious Execution Mechanisms in VBA and OOXML. Journal of Internet Computing and Services, 26, 6, (2025), 23-31. DOI: 10.7472/jksii.2025.26.6.23.

