2021
DOI: 10.1007/978-3-030-92270-2_57
|View full text |Cite
|
Sign up to set email alerts
|

JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism

Abstract: Malicious JavaScript is one of the most common tools for attackers to exploit the vulnerability of web applications. It can carry potential risks such as spreading malware, phishing, or collecting sensitive information. Though there are numerous types of malicious JavaScript that are difficult to detect, generalizing the malicious script's signature can help catch more complex JavaScripts that use obfuscation techniques. This paper aims at detecting malicious JavaScripts based on structure and attribute analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…However, considering graph representation as a sequence is limited in that it loses the structural information of the graph feature, which is an important piece of information to capture from source code graph representations. On the other hand, Rozi et al [34] proposed a structural analysis of the AST feature by using GNN combined with the attention layer to enrich the detection to track the rough location of malicious code based on given the attention score. In that work, they tried to focus on how to track the maliciousness part, which has a different objective than our work.…”
Section: B Graph-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, considering graph representation as a sequence is limited in that it loses the structural information of the graph feature, which is an important piece of information to capture from source code graph representations. On the other hand, Rozi et al [34] proposed a structural analysis of the AST feature by using GNN combined with the attention layer to enrich the detection to track the rough location of malicious code based on given the attention score. In that work, they tried to focus on how to track the maliciousness part, which has a different objective than our work.…”
Section: B Graph-based Approachesmentioning
confidence: 99%
“…Furthermore, the use of a graph-based approach for JavaScript representation not only can be used for detecting the maliciousness of the source code, but it also can be a supporting feature for detecting malicious webpages [42] or websites [43].…”
Section: B Graph-based Approachesmentioning
confidence: 99%