2018
DOI: 10.48550/arxiv.1810.12490
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation

Alexander Jordan,
François Gauthier,
Behnaz Hassanshahi
et al.

Abstract: The popularity of the PDF format and the rich JavaScript environment that PDF viewers offer make PDF documents an attractive attack vector for malware developers. PDF documents present a serious threat to the security of organizations because most users are unsuspecting of them and thus likely to open documents from untrusted sources.We propose to identify malicious PDFs by using conservative abstract interpretation to statically reason about the behavior of the embedded JavaScript code. Currently, state-of-th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…There have been suggestions made for techniques that make use of machine learning in order to identify malicious JavaScript programs [21]. One example of this would be monitoring its execution upon a JavaScript code at run time by using a sequence of events to collect vectors for categorisation.…”
Section: Related Workmentioning
confidence: 99%
“…There have been suggestions made for techniques that make use of machine learning in order to identify malicious JavaScript programs [21]. One example of this would be monitoring its execution upon a JavaScript code at run time by using a sequence of events to collect vectors for categorisation.…”
Section: Related Workmentioning
confidence: 99%
“…I train SE S F θ FQ Dang et al [42] I train SE S F θ FQ Chen et al [44] I train RF S F θ FQ Incer et al [123] I train RF S F θ FQ Al-Dujaili et al [33] I train AT S F θ FQ Chen et al [79] I train IT S F θ FQ Jordan et al [124] I train RF S F θ FQ Li et al [125] I train AT S F θ FQ Chen et al [38] I train SE S F θ FQ obfuscation attack [126] with input (a1, • • • , a5|A6, • • • , A9) = (0, 0, 0, 0, 0|M, Z, BE, ZM), and the attack that modifies important features [36] with input (a…”
Section: Yang Et Al [78]mentioning
confidence: 99%
“…The defense has the input (A1, • • • , A5|a6, • • • , a9) = (Itrain, IT, S, F θ , FQ|0, 0, 0, 0) and achieves CR. Jordan et al [124] propose a robust PDF malware detector against evasion attacks by interpreting JavaScript behaviours using static analysis. A PDF file is classified as malicious when it calls a vulnerable API method or when it exhibits a potentially malicious or unknown behavior.…”
Section: Adversarial Training Work Under the Iid Assumption With Inputmentioning
confidence: 99%
See 1 more Smart Citation