Static Analysis of Malicious Java Applets

作者: Nikitha Ganesh , Fabio Di Troia , Visaggio Aaron Corrado , Thomas H. Austin , Mark Stamp

DOI: 10.1145/2875475.2875477

关键词:

摘要: In this research we consider the problem of detecting malicious Java applets, based on static analysis. Dynamic analysis can be more informative, since it is immune to many common obfuscation techniques, while often efficient, does not require code execution or emulation. Consequently, generally preferred, provided results are comparable those obtained using dynamic We conduct experiments three techniques that have been employed in previous studies metamorphic malware. show our approach detect applets with greater accuracy than previously published relied

参考文章(26)
Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk, None, Anatomy of drive-by download attack information security conference. pp. 49- 58 ,(2013)
John Aycock, Computer Viruses and Malware (Advances in Information Security) Springer-Verlag New York, Inc.. ,(2006)
Anders Krogh, Chapter 4 - An introduction to hidden Markov models for biological sequences New Comprehensive Biochemistry. ,vol. 32, pp. 45- 63 ,(1998) , 10.1016/S0167-7306(08)60461-5
Neha Runwal, Richard M. Low, Mark Stamp, Opcode graph similarity and metamorphic detection Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 37- 52 ,(2012) , 10.1007/S11416-012-0160-5
Suan Hsi Yong, Susan Horwitz, Using Static Analysis to Reduce Dynamic Analysis Overhead formal methods. ,vol. 27, pp. 313- 334 ,(2005) , 10.1007/S10703-005-3401-0
Annie H. Toderici, Mark Stamp , Chi-squared distance and metamorphic virus detection Journal of Computer Virology and Hacking Techniques. ,vol. 9, pp. 1- 14 ,(2013) , 10.1007/S11416-012-0171-2
Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna, Analyzing and Detecting Malicious Flash Advertisements annual computer security applications conference. pp. 363- 372 ,(2009) , 10.1109/ACSAC.2009.41
Jean-Marie Borello, Ludovic Mé, Code obfuscation techniques for metamorphic viruses Journal in Computer Virology. ,vol. 4, pp. 211- 220 ,(2008) , 10.1007/S11416-008-0084-2