Partial evaluation of string obfuscations for Java']Java malware detection

被引:2
|
作者
Chawdhary, Aziem [1 ]
Singh, Ranjeet [1 ]
King, Andy [1 ]
机构
[1] Univ Kent, Sch Comp, Canterbury CT2 7NF, Kent, England
基金
英国工程与自然科学研究理事会;
关键词
Partial evaluation; Malware detection; String deobfuscation;
D O I
10.1007/s00165-016-0357-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by anti virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. Popular obfuscation techniques for Java include string obfuscation and applying reflection to hide method calls; two techniques that can either be used together or independently. This paper shows how to apply partial evaluation to remove these obfuscations and thereby improve AV matching. The paper presents a partial evaluator for Jimple, which is an intermediate language for JVM bytecode designed for optimisation and program analysis, and demonstrates how partially evaluated Jimple code, when transformed back into Java, improves the detection rates of a number of commercial AV products.
引用
收藏
页码:33 / 55
页数:23
相关论文
共 50 条
  • [1] Partial Evaluation for Java']Java Malware Detection
    Singh, Ranjeet
    King, Andy
    [J]. LOGIC-BASED PROGRAM SYNTHESIS AND TRANSFORMATION (LOPSTR 2014), 2015, 8981 : 133 - 147
  • [2] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [3] Reverse Engineering for potential Malware detection: Android APK Smali to Java']Java
    Sharma, Girish
    Mahrishi, Mehul
    Hiran, Kamal Kant
    Doshi, Ruchi
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2020, 15 (01): : 26 - +
  • [4] Decompilation of Java']Java bytecode to Prolog by partial evaluation
    Gomez-Zamalloa, Miguel
    Albert, Elvira
    Puebla, German
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (10) : 1409 - 1427
  • [5] Optimizing Java']Java based web services by partial evaluation
    Lin, L
    Huang, LP
    Sun, YQ
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1071 - 1074
  • [6] Report: Java']Java Is Now the Favorite Malware Target
    不详
    [J]. COMPUTER, 2014, 47 (04) : 16 - 17
  • [7] BejaGNN: behavior-based Java']Java malware detection via graph neural network
    Feng, Pengbin
    Yang, Li
    Lu, Di
    Xi, Ning
    Ma, Jianfeng
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (14): : 15390 - 15414
  • [8] String Analysis for Java']Java and Android Applications
    Li, Ding
    Lyu, Yingjun
    Wan, Mian
    Halfond, William G. J.
    [J]. 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 661 - 672
  • [9] Java']Java Ranger: Supporting String and Array Operations in Java']Java Ranger (Competition Contribution)
    Hussein, Soha
    Yan, Qiuchen
    McCamant, Stephen
    Sharma, Vaibhav
    Whalen, Michael W.
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT II, TACAS 2023, 2023, 13994 : 553 - 558
  • [10] Specializing the Java']Java object serialization using partial evaluation for a faster RMI
    Park, JG
    Lee, AH
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 451 - 458