Wobfuscator: Obfuscating Java']JavaScript Malware via Opportunistic Translation to WebAssembly

被引:1
作者
Romano, Alan [1 ]
Lehmann, Daniel [2 ]
Pradel, Michael [2 ]
Wang, Weihang [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
[2] Univ Stuttgart, Stuttgart, Germany
来源
43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022) | 2022年
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
CODE; WEB;
D O I
10.1109/SP46214.2022.00064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To protect web users from malicious JavaScript code, various malware detectors have been proposed, which analyze and classify code as malicious or benign. State-of-theart detectors focus on JavaScript as the only target language. However, WebAssembly provides attackers a new and so far unexplored opportunity for evading malware detectors. This paper presents Wobfuscator, the first technique for evading static JavaScript malware detection by moving parts of the computation into WebAssembly. The core of the technique is a set of code transformations that translate carefully selected parts of behavior implemented in JavaScript into WebAssembly. The approach is opportunistic in the sense that it uses WebAssembly where it helps to evade malware detection without compromising the correctness of the code. Evaluating our approach with a dataset of 43,499 malicious and 149,677 benign JavaScript files, as well as six popular JavaScript libraries reveals that our approach is effective at evading state-of-the-art, learning-based static malware detectors; the obfuscation is semantic-preserving; and our approach has small overhead, making it practical for use in real-world programs. By pinpointing limitations of current malware detectors, our work motivates future efforts on detecting multi-language malware in the web.
引用
收藏
页码:1574 / 1589
页数:16
相关论文
共 69 条
  • [1] JS']JSOD: Java']JavaScript obfuscation detector
    AL-Taharwa, Ismail Adel
    Lee, Hahn-Ming
    Jeng, Albert B.
    Wu, Kuo-Ping
    Ho, Cheng-Seen
    Chen, Shyi-Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1092 - 1107
  • [2] Alsharnouby M., 2021, LEXICAL JSDETECTOR
  • [3] Alsharnouby M., 2021, SYNTACTIC JSDETECTOR
  • [4] Why phishing still works: User strategies for combating phishing attacks
    Alsharnouby, Mohamed
    Alaca, Furkan
    Chiasson, Sonia
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 : 69 - 82
  • [5] [Anonymous], Espree -
  • [6] [Anonymous], JSOBFU RAPID7
  • [7] [Anonymous], 2021, JSTAP STATIC PREFILT
  • [8] [Anonymous], GITHUB JAVASCRIPT OB
  • [9] [Anonymous], WebAssembly Core Specification
  • [10] [Anonymous], WABT