Wobfuscator: Obfuscating Java']JavaScript Malware via Opportunistic Translation to WebAssembly

被引:2
|
作者
Romano, Alan [1 ]
Lehmann, Daniel [2 ]
Pradel, Michael [2 ]
Wang, Weihang [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
[2] Univ Stuttgart, Stuttgart, Germany
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
CODE; WEB;
D O I
10.1109/SP46214.2022.00064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To protect web users from malicious JavaScript code, various malware detectors have been proposed, which analyze and classify code as malicious or benign. State-of-theart detectors focus on JavaScript as the only target language. However, WebAssembly provides attackers a new and so far unexplored opportunity for evading malware detectors. This paper presents Wobfuscator, the first technique for evading static JavaScript malware detection by moving parts of the computation into WebAssembly. The core of the technique is a set of code transformations that translate carefully selected parts of behavior implemented in JavaScript into WebAssembly. The approach is opportunistic in the sense that it uses WebAssembly where it helps to evade malware detection without compromising the correctness of the code. Evaluating our approach with a dataset of 43,499 malicious and 149,677 benign JavaScript files, as well as six popular JavaScript libraries reveals that our approach is effective at evading state-of-the-art, learning-based static malware detectors; the obfuscation is semantic-preserving; and our approach has small overhead, making it practical for use in real-world programs. By pinpointing limitations of current malware detectors, our work motivates future efforts on detecting multi-language malware in the web.
引用
收藏
页码:1574 / 1589
页数:16
相关论文
共 44 条
  • [1] Static Semantics Reconstruction for Enhancing Java']JavaScript-WebAssembly Multilingual Malware Detection
    Xia, Yifan
    He, Ping
    Zhang, Xuhong
    Liu, Peiyu
    Ji, Shouling
    Wang, Wenhai
    [J]. COMPUTER SECURITY - ESORICS 2023, PT II, 2024, 14345 : 255 - 276
  • [2] On the Runtime and Energy Performance of WebAssembly Is WebAssembly superior to Java']JavaScript yet?
    De Macedo, Joao
    Abreu, Rui
    Pereira, Rui
    Saraiva, Joao
    [J]. 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 255 - 262
  • [3] WebAssembly versus Java']JavaScript: Energy and Runtime Performance
    De Macedo, Joao
    Abreu, Rui
    Pereira, Rui
    Saraiva, Joao
    [J]. 2022 INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABILITY (ICT4S 2022), 2022, : 24 - 34
  • [4] Leveraging WebAssembly for Numerical Java']JavaScript Code Virtualization
    Wang, Shuai
    Ye, Guixin
    Li, Meng
    Yuan, Lu
    Tang, Zhanyong
    Wang, Huanting
    Wang, Wei
    Wang, Fuwei
    Ren, Jie
    Fang, Dingyi
    Wang, Zheng
    [J]. IEEE ACCESS, 2019, 7 : 182711 - 182724
  • [5] Advanced Transcriptase for Java']JavaScript Malware
    Di Troia, Fabio
    Visaggio, Corrado Aaron
    Austin, Thomas H.
    Stamp, Mark
    [J]. 2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2016, : 121 - 128
  • [6] Hunting for metamorphic Java']JavaScript malware
    Musale, Mangesh
    Austin, Thomas H.
    Stamp, Mark
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02): : 89 - 102
  • [7] WebAssembly - Hope for Fast Acceleration of Web Applications Using Java']JavaScript
    Fras, Krystian
    Nowak, Ziemowit
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT I, 2020, 1050 : 275 - 284
  • [8] Java']Java-to-Java']JavaScript Translation via Structured Control Flow Reconstruction of Compiler IR
    Leopoldseder, David
    Stadler, Lukas
    Wimmer, Christian
    Moessenboeck, Hanspeter
    [J]. ACM SIGPLAN NOTICES, 2016, 51 (02) : 91 - 103
  • [9] A Study of Timing Side-Channel Attacks and Countermeasures on Java']JavaScript and WebAssembly
    Mazaheri, Mohammad Erfan
    Sarmadi, Siavash Bayat
    Ardakani, Farhad Taheri
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 1 - 20
  • [10] Is eval () Evil : A study of Java']JavaScript in PDF malware
    Lemay, Antoine
    Leblanc, Sylvain P.
    [J]. PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 13 - 22