Early detection of malicious behavior in javascript code

被引:0
|
作者
Schütt, Kristof [1 ]
Kloft, Marius [1 ]
Bikadorov, Alexander [1 ]
Rieck, Konrad [2 ]
机构
[1] Technische Universität Berlin, Berlin, Germany
[2] University of Göttingen, Göttingen, Germany
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
5th ACM Workshop on Artificial Intelligence and Security, AISec 2012
中图分类号
学科分类号
摘要
Artificial intelligence - Damage detection - Malware - High level languages - Learning systems - Web browsers
引用
收藏
页码:15 / 24
相关论文
共 50 条
  • [1] Detection of Obfuscated Malicious Java']JavaScript Code
    Alazab, Ammar
    Khraisat, Ansam
    Alazab, Moutaz
    Singh, Sarabjot
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [2] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    [J]. Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079
  • [3] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [4] JACLNet:Application of adaptive code length network in Java']JavaScript malicious code detection
    Zhang, Zhining
    Wan, Liang
    Chu, Kun
    Li, Shusheng
    Wei, Haodong
    Tang, Lu
    [J]. PLOS ONE, 2022, 17 (12):
  • [5] Polymorphic Malicious Java']JavaScript Code Detection for APT Attack Defence
    Choi, Junho
    Choi, Chang
    You, Ilsun
    Kim, Pankoo
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 369 - 383
  • [6] Detecting malicious Java']JavaScript code in Mozilla
    Hallaraker, O
    Vigna, G
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
  • [7] Analysis and Identification of Malicious Java']JavaScript Code
    Fraiwan, Mohammad
    Al-Salman, Rami
    Khasawneh, Natheer
    Conrad, Stefan
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 1 - 11
  • [8] THE BEHAVIOR ORIENTED DETECTION OF MALICIOUS CODE OVERVIEW
    Deng, Jin-Cheng
    Liu, Dan
    Hu, Yue
    Liang, Zong-Wen
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 235 - 238
  • [9] MALICIOUS CODE DETECTION WITH INTEGRATED BEHAVIOR ANALYSIS
    Li, Xiao-Yong
    Liu, Wei-Wei
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2797 - 2801
  • [10] Malicious code detection and prevention in virtual behavior mechanism
    Li, Xiao-Yong
    Zhou, Li-Tao
    Shi, Yong
    Guo, Yu
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2010, 32 (01): : 101 - 106