DOI: 10.32657/10220/47659
|View full text |Cite
|
Sign up to set email alerts
|

Detection and analysis of web-based malware and vulnerability

Abstract: Context-Sensitive Grammar (PCSG) from a large number of samples of one specific grammar. The feature of PCSG can help us to generate samples whose syntax and semantics are correct with high probability. The experimental results demonstrate that both the bug finding capability and code coverage of fuzzing are advanced. We further improve coverage-based greybox fuzzing by proposing a new grammaraware approach for programs that process structured inputs. In details, our approach requires the grammar of test input… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 51 publications
(87 reference statements)
0
3
0
Order By: Relevance
“…11 Attacker is capturing every activity of the victim on his/her machine on watching in real time the typed characters and taking note of the inserted password is not possible. However, a simple workaround is the installation of a keylogger on the attacker browser (a Chrome add-on in the test here described [32]). By that, anything the victim types (passwords, PINs, etc.)…”
Section: Bitm Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…11 Attacker is capturing every activity of the victim on his/her machine on watching in real time the typed characters and taking note of the inserted password is not possible. However, a simple workaround is the installation of a keylogger on the attacker browser (a Chrome add-on in the test here described [32]). By that, anything the victim types (passwords, PINs, etc.)…”
Section: Bitm Experimental Resultsmentioning
confidence: 99%
“…-BitM client-side: in this case the attacker may insert malicious JavaScript code or web-based malware [32] in the web page served to the victim (the end user). By such an approach, for example, an attack might be arranged along the lines of the Man-in-the-Browser (MitB) attack described in the "Related Work" section: the victim might be lead to download all kinds of malware to be installed in the web browser or, more simply, to deceptively use a Browser Exploitation Framework (BeeF) [33,34].…”
Section: Possible Bitm Attacksmentioning
confidence: 99%
“…A report from Dasient, and cited by Chang et al (2013), suggests that the number of malware delivering websites doubled between 2009 and 2010. "There were 3.424 billion people using the Internet by July 2018" (Wang, 2018). Carrying out activities on an infected website is a sufficient pathway for an attacker to take advantage of the weakness of a browser.…”
Section: Introductionmentioning
confidence: 99%