2014 Twelfth Annual International Conference on Privacy, Security and Trust 2014
DOI: 10.1109/pst.2014.6890948
|View full text |Cite
|
Sign up to set email alerts
|

Detection and mitigation of malicious JavaScript using information flow control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The following are few examples of different approaches considered by researchers in the last few years. B. Sayed et al proposed a model that uses information flow control dynamically at run-time to detect malicious JavaScript [22]. Y. Fange et al used Long Short-Term Memory (LSTM) to develop a malicious JavaScript detection model [8].…”
Section: Related Workmentioning
confidence: 99%
“…The following are few examples of different approaches considered by researchers in the last few years. B. Sayed et al proposed a model that uses information flow control dynamically at run-time to detect malicious JavaScript [22]. Y. Fange et al used Long Short-Term Memory (LSTM) to develop a malicious JavaScript detection model [8].…”
Section: Related Workmentioning
confidence: 99%
“…Exploration of both static and dynamic approaches are made in [33], and hybrid mechanisms such as [34,35,36], are provided to enhance the information flow capability and increasing permissiveness, by realizing static analysis by security type systems and realizing dynamic analysis by monitors. This hybrid approach was also employed in the development of a new system and language, Fabric [37], which is used to build secure distributed information systems.…”
Section: Related Workmentioning
confidence: 99%
“…JS malware detection is an active research area, therefore, various detection models were proposed due to the limited detection capability of existing antivirus software. Most ex-isting JS malware detection research articles have used two methods: dynamic [11], [16], [21], [29] and static [12], [15], [18] analysis. The static approach can detect only known malware, but the dynamic approach can also make decisions about new malware by analyzing the behavior of the malware.…”
Section: Introductionmentioning
confidence: 99%