JAST: Fully Syntactic Detection of Malicious (Obfuscated) Java']JavaScript

被引:36
|
作者
Fass, Aurore [1 ]
Krawczyk, Robert P. [2 ]
Backes, Michael [3 ]
Stock, Ben [3 ]
机构
[1] Saarland Univ, CISPA, Saarland Informat Campus, Saarbrucken, Germany
[2] German Fed Off Informat Secur BSI, Bonn, Germany
[3] CISPA Helmholtz Ctr iG, Saarland Informat Campus, Saarbrucken, Germany
关键词
D O I
10.1007/978-3-319-93411-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
JavaScript is a browser scripting language initially created to enhance the interactivity of web sites and to improve their user-friendliness. However, as it offloads the work to the user's browser, it can be used to engage in malicious activities such as Crypto Mining, Drive-by Download attacks, or redirections to web sites hosting malicious software. Given the prevalence of such nefarious scripts, the antivirus industry has increased the focus on their detection. The attackers, in turn, make increasing use of obfuscation techniques, so as to hinder analysis and the creation of corresponding signatures. Yet these malicious samples share syntactic similarities at an abstract level, which enables to bypass obfuscation and detect even unknown malware variants. In this paper, we present JAST, a low-overhead solution that combines the extraction of features from the abstract syntax tree with a random forest classifier to detect malicious JavaScript instances. It is based on a frequency analysis of specific patterns, which are either predictive of benign or of malicious samples. Even though the analysis is entirely static, it yields a high detection accuracy of almost 99.5% and has a low false-negative rate of 0.54%.
引用
收藏
页码:303 / 325
页数:23
相关论文
共 50 条
  • [41] Detecting Malicious Java']Javascript in PDF through Document Instrumentation
    Liu, Daiping
    Wang, Haining
    Stavrou, Angelos
    [J]. 2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 100 - 111
  • [42] Obfuscated malicious code detection with path condition analysis
    Fan, Wenqing
    Lei, Xue
    An, Jing
    [J]. Journal of Networks, 2014, 9 (05) : 1208 - 1214
  • [43] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24
  • [44] JS']JSContana: Malicious Java']JavaScript detection using adaptable context analysis and key feature extraction
    Huang, Yunhua
    Li, Tao
    Zhang, Lijia
    Li, Beibei
    Liu, Xiaojie
    [J]. COMPUTERS & SECURITY, 2021, 104
  • [45] JS']JStrong: Malicious Java']JavaScript detection based on code semantic representation and graph neural network
    Fang, Yong
    Huang, Chaoyi
    Zeng, Minchuan
    Zhao, Zhiying
    Huang, Cheng
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [46] JS']JSRevealer: A Robust Malicious Java']JavaScript Detector against Obfuscation
    Ren, Kunlun
    Qiang, Weizhong
    Wu, Yueming
    Zhou, Yi
    Zou, Deqing
    Jin, Hai
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 339 - 351
  • [47] Java']JavaScript Malicious Codes Analysis Based on Naive Bayes Classification
    Hao, Yongle
    Liang, Hongliang
    Zhang, Daijie
    Zhao, Qian
    Cui, Baojiang
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 513 - 519
  • [48] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16
  • [49] Towards the Detection of Malicious Java']Java Packages
    Ladisa, Piergiorgio
    Plate, Henrik
    Martinez, Matias
    Barais, Olivier
    Ponta, Serena Elisa
    [J]. PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2022, 2022, : 63 - 72
  • [50] Malicious PDF Detection Model against Adversarial Attack Built from Benign PDF Containing Java']JavaScript
    Kang, Ah Reum
    Jeong, Young-Seob
    Kim, Se Lyeong
    Woo, Jiyoung
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (22):