On improvements of robustness of obfuscated Java']JavaScript code detection

被引:0
|
作者
Ponomarenko, G. S. [1 ]
Klyucharev, P. G. [1 ]
机构
[1] Bauman Moscow State Tech Univ, Moscow, Russia
关键词
obfuscation detection; obfuscator model classification; !text type='java']java[!/text]script obfuscation; !text type='java']java[!/text]script minification; machine learning for software engineering; MALICIOUS [!text type='JAVA']JAVA[!/text]SCRIPT; CLASSIFICATION;
D O I
10.1007/s11416-022-00450-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is dedicated to the problem of design of the detector for obfuscated JavaScript code using machine learning technologies. The main challenge was to design models that would be robust against obfuscators that the model got not familiar with during the training process. During the research we were trying to simulate the scenario when the obfuscation detector, trained to detect samples obfuscated by the specific obfuscators, is given samples that were processed by some another obfuscator. The presented approach of the feature engineering and model training allowed to get better accuracy on the previously unseen obfuscators comparing to the reference work. It was shown that treating minified code samples as obfuscated, as well as enriching the set of the lexical and syntactical features could improve detector's quality.
引用
收藏
页码:387 / 398
页数:12
相关论文
共 50 条
  • [31] JS']JSAC: A Novel Framework to Detect Malicious Java']JavaScript via CNNs over AST and CFG
    Jiang, Hongliang
    Yang, Yuxing
    Sun, Lu
    Jiang, Lin
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [32] DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection
    Millar, Stuart
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Miller, Paul
    Zhao, Ziming
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 353 - 364
  • [33] Semantics-Preserving Dissection of Java']JavaScript Exploits via Dynamic JS']JS-Binary Analysis
    Hu, Xunchao
    Prakash, Aravind
    Wang, Jinghan
    Zhou, Rundong
    Cheng, Yao
    Yin, Heng
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016, 2016, 9854 : 254 - 276
  • [34] A motion classification model with improved robustness through deformation code integration
    Lei Xia
    Jiancheng Lv
    Dongbo Liu
    Neural Computing and Applications, 2019, 31 : 8519 - 8532
  • [35] A motion classification model with improved robustness through deformation code integration
    Xia, Lei
    Lv, Jiancheng
    Liu, Dongbo
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (12): : 8519 - 8532
  • [36] On the robustness of skeleton detection against adversarial attacks
    Bai, Xiuxiu
    Yang, Ming
    Liu, Zhe
    NEURAL NETWORKS, 2020, 132 : 416 - 427
  • [37] Java']Java Sparrow Bird Sex Detection Through Texture Analysis and Beak Image Color
    Mulyono, Agus
    PAKISTAN JOURNAL OF ZOOLOGY, 2022, 54 (06) : 2675 - 2679
  • [38] Robustness of Deep Learning models in electrocardiogram noise detection and classification
    Rahman, Saifur
    Pal, Shantanu
    Yearwood, John
    Karmakar, Chandan
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2024, 253
  • [39] Jadeite: A novel image-behavior-base approach for Java']Java malware detection using deep learning
    Obaidat, Islam
    Sridhar, Meera
    Pham, Khue M.
    Phung, Phu H.
    COMPUTERS & SECURITY, 2022, 113
  • [40] Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training
    Maneerat, Tonkla
    Iam-On, Natthakan
    Boongoen, Tossapon
    Kirimasthong, Khwunta
    Naik, Nitin
    Yang, Longzhi
    Shen, Qiang
    INFORMATION SCIENCES, 2025, 687