Presentation | 2017-07-27 Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-virus softwares are used in Drive-by-Download attacks. In this paper, we focus on the fact that the segments of URL are declared as variables and connected later. Our scheme stores variables and their contents in the dictionary type object and in the connection parts, verifies that malicious URL can be reconstructed. By the computer simulation with real dataset, we show that our scheme improves the detection effectiveness of the conventional scheme. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Drive-by-Download attacks / Obfuscation techniques / JavaScript detection |
Paper # | CS2017-15 |
Date of Issue | 2017-07-20 (CS) |
Conference Information | |
Committee | CS |
---|---|
Conference Date | 2017/7/27(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Fukue Bunka Kaikan |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Next generation networks, access network, broadband access system, power-line communications, wireless communication systems, coding system, etc. |
Chair | Tetsuya Yokotani(Kanazawa Inst. of Tech.) |
Vice Chair | Hidenori Nakazato(Waseda Univ.) |
Secretary | Hidenori Nakazato(Kyushu Univ.) |
Assistant | Kenji Kanai(Waseda Univ.) / Kazutaka Hara(NTT) |
Paper Information | |
Registration To | Technical Committee on Communication Systems |
---|---|
Language | ENG-JTITLE |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL |
Sub Title (in English) | |
Keyword(1) | Drive-by-Download attacks |
Keyword(2) | Obfuscation techniques |
Keyword(3) | JavaScript detection |
1st Author's Name | Shoya Morishige |
1st Author's Affiliation | Keio University(Keio Univ.) |
2nd Author's Name | Shuichiro Haruta |
2nd Author's Affiliation | Keio University(Keio Univ.) |
3rd Author's Name | Hiromu Asahina |
3rd Author's Affiliation | Keio University(Keio Univ.) |
4th Author's Name | Iwao Sasase |
4th Author's Affiliation | Keio University(Keio Univ.) |
Date | 2017-07-27 |
Paper # | CS2017-15 |
Volume (vol) | vol.117 |
Number (no) | CS-156 |
Page | pp.pp.13-18(CS), |
#Pages | 6 |
Date of Issue | 2017-07-20 (CS) |