Proceedings of the 19th International Conference on World Wide Web 2010
DOI: 10.1145/1772690.1772720
|View full text |Cite
|
Sign up to set email alerts
|

Detection and analysis of drive-by-download attacks and malicious JavaScript code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
308
0
5

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 439 publications
(315 citation statements)
references
References 10 publications
2
308
0
5
Order By: Relevance
“…They modeled a document as a set of structural paths and detected malicious PDF using Decision Tree and SVM (Support Vector Machine). Wepawet [18] uses JSAND [14], which leverages statistical and lexical features of Javascript, to detect malicious PDF. In general, static methods have been proven to be simple, fast, and effective.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They modeled a document as a set of structural paths and detected malicious PDF using Decision Tree and SVM (Support Vector Machine). Wepawet [18] uses JSAND [14], which leverages statistical and lexical features of Javascript, to detect malicious PDF. In general, static methods have been proven to be simple, fast, and effective.…”
Section: Related Workmentioning
confidence: 99%
“…One intuitive choice is to extract Javascript from documents [9] [14]. Alternatively, Javascript interpreters can be instrumented [15].…”
Section: Introductionmentioning
confidence: 99%
“…There have been many techniques proposed to detect drive-by downloads. Cova et al [5] proposed an emulation based execution of webpages to extract the behavior of JavaScript code and the use of machine-learning techniques to differentiate anomalous samples. An attack-agnostic approach was introduced in BLADE [11] based on the intuition that unconsented browser downloads should be isolated and not executed.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the raw number of different vulnerabilities and drive-by download attacks, and the high rate of addition of new exploits and changes of the exploit kits, the fight against web-distributed malware is mostly carried out by automated analysis systems, called "honeyclients", that visit a web page suspected of malicious behavior and analyze the behavior of the page to determine its maliciousness [12,16,5,14,17,10]. These systems fall into two main categories: low-interaction honeyclients and high-interaction honeyclients.…”
Section: Introductionmentioning
confidence: 99%
“…To locate the other nearby malicious pages, they design several gadgets to automatically generate search queries. However, with the three oracles used in their work, Google's Safe Browing blacklist [5], Wepawet [18], and a custom-built tool to detect sites that host fake AV tools, EvilSeed cannot handle more stealthy attacks such as Search Poisoning Attacks discussed in this paper. That is, EvilSeed can only find a small subset of these cloaking attacks that PoisonAmplifier can find.…”
Section: Related Workmentioning
confidence: 99%