2016
DOI: 10.1186/s13635-016-0045-0
|View full text |Cite
|
Sign up to set email alerts
|

Hidost: a static machine-learning-based detector of malicious files

Abstract: Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malware as a stealthy attack vector. There exists a substantial body of previous work on the detection of non-executable malware, including static, dynamic, and combined methods. While static methods perform orders of magnitude faster, their applicability has been hitherto limited to specific file formats. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(62 citation statements)
references
References 20 publications
(25 reference statements)
0
58
0
Order By: Relevance
“…The most popular example is Poppler, a comprehensive PDF library that is adopted by the popular open-source reader XPDF. PJscan [7] and Hidost [3] use Poppler to detect PDF files embedding malicious JavaScript code. Although these libraries correctly implement most of the Adobe PDF specifications, they may be vulnerable to well-crafted malformations of PDF files.…”
Section: 11mentioning
confidence: 99%
See 1 more Smart Citation
“…The most popular example is Poppler, a comprehensive PDF library that is adopted by the popular open-source reader XPDF. PJscan [7] and Hidost [3] use Poppler to detect PDF files embedding malicious JavaScript code. Although these libraries correctly implement most of the Adobe PDF specifications, they may be vulnerable to well-crafted malformations of PDF files.…”
Section: 11mentioning
confidence: 99%
“…Wepawet [6] Dynamic JSand JS-based Bayesian PJScan [7] Static Poppler JS-based SVM Hidost [3] Static Poppler Structural Random Forest Lux0R [8] Static PhoneyPDF JS-based Random Forest Slayer [1] Static PDFID Structural Random Forest Slayer NEO [2] Static PeePDF+Origami Structural Adaboost PDFRate [4] Static Custom Structural Random Forest PDFRate (updated) [5] Static Custom Structural Classifier Ensemble to represent each file as a numerical vector of fixed size. This process is usually referred to as feature extraction.…”
Section: Pre-processing Features Classifiermentioning
confidence: 99%
“…In order to detect the malicious documents, many studies focused on feature extraction based on the PDF structure analysis, where the features can be seen as a summary of the logical structure. In [7], a format-independent static analysis method, namely, a hierarchical document structure (hidost), was proposed. They adopted a structural multimap, where structural paths are represented by keys and the leaves are indicated by values.…”
Section: Malware Detection On Stream Datamentioning
confidence: 99%
“…Some works focus on the metadata of a PDF (see Section 2.1) to determine its maliciousness [14,11,10,24,21]. They all perform structural analyses of the documents to extract the features they need.…”
Section: Metadatamentioning
confidence: 99%