JS']JSOD: Java']JavaScript obfuscation detector

被引:16
作者
AL-Taharwa, Ismail Adel [1 ]
Lee, Hahn-Ming [1 ,2 ]
Jeng, Albert B. [1 ,3 ]
Wu, Kuo-Ping [1 ]
Ho, Cheng-Seen [1 ,4 ]
Chen, Shyi-Ming [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[3] Netxtream Technol Inc, New Taipei City, Taiwan
[4] Tungnan Univ, Dept Informat Technol, New Taipei City, Taiwan
关键词
obfuscated [!text type='Java']Java[!/text]Script; drive-by-download; static analysis; AST; machine learning; malicious code detection;
D O I
10.1002/sec.1064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
JavaScript obfuscation is a deliberate act of making a script difficult to understand by concealing its purpose. The prevalent use of obfuscation techniques to hide malicious codes and to preserve copyrights of benign scripts resulted in (i) missing detection of malicious scripts that are obfuscated and (ii) raising false alarms due to the benign scripts that are obfuscated. Automatic detection of obfuscated JavaScript is generally undertaken by tackling the problem from the readability perspective. Recently, Microsoft research team analyzed different levels of context-based features to distinguish obfuscated malicious scripts from obfuscated benign ones. In this work, we raise the issue of existing readable versions of obfuscated scripts. Further, we discuss the challenges posed by readably obfuscated scripts against both JavaScript malware detectors and obfuscated scripts detectors. Therefore, we propose JavaScript Obfuscation Detector (JSOD), a completely static solution to detect obfuscated scripts including readable patterns. To evaluate JSOD, we compare it to the state-of-the-art approaches to detect obfuscated malicious and obfuscated benign script, namely, Zozzle and Nofus. Our experimental results demonstrate the importance to detect readably obfuscated scripts and their sophisticated variations. Furthermore, they also show the superiority of JSOD approach against all relevant solutions. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1092 / 1107
页数:16
相关论文
共 39 条
  • [1] Al-Taharwa I. A., 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P787
  • [2] Alexa, 2012, GLOB TOP SIT
  • [3] [Anonymous], 2007, Proceedings of the 3rd international workshop on Adversarial information retrieval on the Web
  • [4] [Anonymous], NEW TECHN MOB SEC NT
  • [5] [Anonymous], 2011, Proceedings of the 20th International Conference on World Wide Web, WWW'11, DOI DOI 10.1145/1963405.1963436
  • [6] [Anonymous], 2009, P 18 INT C WORLD WID, DOI [DOI 10.1145/1526709.1526838, 10.1145/1526709.1526838]
  • [7] [Anonymous], 2006, P 23 INT C MACHINE L, DOI DOI 10.1145/1143844.1143874
  • [8] [Anonymous], 2003, ICML
  • [9] [Anonymous], 2011, P 20 USENIX C SECURI
  • [10] A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude
    Blanc, Gregory
    Kadobayashi, Youki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2159 - 2166