The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1007/978-3-642-36883-7_8
|View full text |Cite
|
Sign up to set email alerts
|

JSGuard: Shellcode Detection in JavaScript

Abstract: Abstract. JavaScript (JS) based shellcode injections are among the most dangerous attacks to computer systems. Existing approaches have various limitations in detecting such attacks. In this paper, we propose a new detection methodology that overcomes these limitations by fully using JS code execution environment information. We leverage this information and create a virtual execution environment where shellcodes' real behavior can be precisely monitored and detection redundancy can be reduced. Following this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
(55 reference statements)
0
2
0
Order By: Relevance
“…In static detecting methods, input data are first disassembled and then screened via code level pattern analysis and matching. Patterns can be complicated signatures or simple heuristics that are obtained from studying known malicious codes [9]. Although static detecting method is fast, it could not detect the unknown ShellCode and detect the ShellCode's behavior in detail.…”
Section: Static and Dynamic Shellcode Detecting Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In static detecting methods, input data are first disassembled and then screened via code level pattern analysis and matching. Patterns can be complicated signatures or simple heuristics that are obtained from studying known malicious codes [9]. Although static detecting method is fast, it could not detect the unknown ShellCode and detect the ShellCode's behavior in detail.…”
Section: Static and Dynamic Shellcode Detecting Methodsmentioning
confidence: 99%
“…Dynamic detecting methods detect malicious ShellCode by using information generated during ShellCode execution [9]. In dynamic detecting methods, instructions are analyzed when the code actually executes, dynamic methods are immune to obfuscation attempts and self-modifying programs [10].…”
Section: Static and Dynamic Shellcode Detecting Methodsmentioning
confidence: 99%
“…To de-obfuscate malicious JavaScript code, Gen et al [29] simplify the obfuscated JavaScript code by preserving the semantics of the observational equivalence. JSGuard [21] proposed a methodology to detect JavaScript shellcode that fully uses JavaScript code execution environment information with low false negative and false positive. Liu et al [28] propose a context-aware approach for detection and confinement of malicious JavaScript in PDF by inserting context monitoring code into a document.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, a number of techniques [17], [29], [22], [21], [26], [35], [18], [25], [16] have been proposed to detect malicious JavaScript code. Due to the dynamic features of the JavaScript language, static analysis [20], [27], [38], [18] can be easily evaded using obfuscation techniques [46].…”
Section: Introductionmentioning
confidence: 99%