Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References

作者: Igino Corona , Davide Maiorca , Davide Ariu , Giorgio Giacinto , None

DOI: 10.1145/2666652.2666657

关键词:

摘要: … The selection algorithm has been thought to be “secure by design” against evasion by … the adversarial evaluation aims to test whether our system is able to cope with an adversary …

参考文章(25)
Nedim Šrndić, Battista Biggio, Giorgio Giacinto, Igino Corona, Fabio Roli, Davide Maiorca, Blaine Nelson, Pavel Laskov, Evasion attacks against machine learning at test time european conference on machine learning. ,vol. 8190, pp. 387- 402 ,(2013) , 10.1007/978-3-642-40994-3_25
Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert, ZOZZLE: fast and precise in-browser JavaScript malware detection usenix security symposium. pp. 3- 3 ,(2011)
Mario Heiderich, Tilman Frosch, Thorsten Holz, IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM Lecture Notes in Computer Science. pp. 281- 300 ,(2011) , 10.1007/978-3-642-23644-0_15
Davide Maiorca, Giorgio Giacinto, Igino Corona, A pattern recognition system for malicious PDF files detection machine learning and data mining in pattern recognition. ,vol. 7376, pp. 510- 524 ,(2012) , 10.1007/978-3-642-31537-4_40
Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna, None, Revolver: an automated approach to the detection of evasiveweb-based malware usenix security symposium. pp. 637- 652 ,(2013)
Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn, NOZZLE: a defense against heap-spraying code injection attacks usenix security symposium. pp. 169- 186 ,(2009)
Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli, Security Evaluation of Support Vector Machines in Adversarial Environments arXiv: Learning. ,vol. 9783319023007, pp. 105- 153 ,(2014) , 10.1007/978-3-319-02300-7_4
Ron Kohavi, A study of cross-validation and bootstrap for accuracy estimation and model selection international joint conference on artificial intelligence. ,vol. 2, pp. 1137- 1143 ,(1995)
Marco Cova, Christopher Kruegel, Giovanni Vigna, Detection and analysis of drive-by-download attacks and malicious JavaScript code the web conference. pp. 281- 290 ,(2010) , 10.1145/1772690.1772720
Konrad Rieck, Tammo Krueger, Andreas Dewald, Cujo: efficient detection and prevention of drive-by-download attacks annual computer security applications conference. pp. 31- 39 ,(2010) , 10.1145/1920261.1920267