Proceedings of the 27th Annual Computer Security Applications Conference 2011
DOI: 10.1145/2076732.2076785
|View full text |Cite
|
Sign up to set email alerts
|

Static detection of malicious JavaScript-bearing PDF documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 134 publications
(122 citation statements)
references
References 14 publications
0
122
0
Order By: Relevance
“…False Positive True Positive N-grams [17] 31% 84% PJScan [7] 16% 85% PDFRate [4] 2% 99% Structural [5] 0.05% 99% MDScan [9] N/A 89% Wepawet [18] N/A 68% [9] Ours 0 97% system with other methods by analyzing possible advanced attacks.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…False Positive True Positive N-grams [17] 31% 84% PJScan [7] 16% 85% PDFRate [4] 2% 99% Structural [5] 0.05% 99% MDScan [9] N/A 89% Wepawet [18] N/A 68% [9] Ours 0 97% system with other methods by analyzing possible advanced attacks.…”
Section: Methodsmentioning
confidence: 99%
“…In 2011, Laskov et al [7] presented PJScan, the first static method dedicated to the detection of malicious PDF. Using a patched SpiderMonkey, PJScan extracts lexical tokens of Javascript and trains an OCSVM (One Class Support Vector Machine) classifier to identify malicious PDF.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations