2013
DOI: 10.1007/978-3-642-39235-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Weaknesses in Defenses against Web-Borne Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…As the second alternative illustrates, the validation step of a defense need not involve an explicit comparison against some expected value; rather, it can simply be a computation that produces correct output if and only if the observation produces the observed value. Lu and Debray use a similar approach in a construct called "implicit conditionals" that branch to the correct targets only if certain environmental observations yield expected values [24].…”
Section: Self-checksumming-based Anti-tamper Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…As the second alternative illustrates, the validation step of a defense need not involve an explicit comparison against some expected value; rather, it can simply be a computation that produces correct output if and only if the observation produces the observed value. Lu and Debray use a similar approach in a construct called "implicit conditionals" that branch to the correct targets only if certain environmental observations yield expected values [24].…”
Section: Self-checksumming-based Anti-tamper Defensesmentioning
confidence: 99%
“…However, identifying such conceptual similarities can be helpful for devising strategies for neutralizing them. For example, Cappaert et al [4] and Wang et al [41] discuss how checksum values can be used as code unpacking keys in anti-tampering defenses; Lu and Debray [24] discuss the use of timing information in antianalysis defenses in web-based malware that use emulationbased obfuscation. While these may seem, superficially, to be very different kinds of defenses, they share underlying structural similarities; understanding these similarities can be useful in adapting defenses from one to the other.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers abuse various web techniques to evade analysis and detection by security researchers/vendors. For example, JavaScript code pieces separately written in many script tags (scattered code) and JavaScript code dynamically generated by eval() and DOM manipulation functions (obfuscated code) are used in malicious websites to evade signature matching [16]. In addition, attackers abuse browserfingerprinting techniques to increase the success rate of exploitation.…”
Section: Motivating Examplementioning
confidence: 99%