Tellenbach et al., 2016 - Google Patents
Detecting obfuscated JavaScripts from known and unknown obfuscators using machine learningTellenbach et al., 2016
View PDF- Document ID
 - 17853504794452121149
 - Author
 - Tellenbach B
 - Paganoni S
 - Rennhard M
 - Publication year
 - Publication venue
 - International Journal on Advances in Security
 
External Links
Snippet
JavaScript is a common attack vector to probe for known vulnerabilities to select a fitting  exploit or to manipulate the Document Object Model (DOM) of a web page in a harmful way.  The JavaScripts used in such attacks are often obfuscated to make them hard to detect using … 
    - 238000010801 machine learning 0 title description 20
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 - G06F21/563—Static detection by source code analysis
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/36—Preventing errors by testing or debugging software
 - G06F11/3668—Software testing
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
 - G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Kapravelos et al. | Revolver: An automated approach to the detection of evasive web-based malware | |
| Wang et al. | A deep learning approach for detecting malicious JavaScript code | |
| Han et al. | Implementing automated safety circuit breakers of large language models for prompt integrity | |
| Park et al. | Fast malware classification by automated behavioral graph matching | |
| Kasim | An ensemble classification-based approach to detect attack level of SQL injections | |
| Wang et al. | Jsdc: A hybrid approach for javascript malware detection and classification | |
| Tellenbach et al. | Detecting obfuscated JavaScripts from known and unknown obfuscators using machine learning | |
| Tu et al. | Webshell detection techniques in web applications | |
| Song et al. | Evaluations of AI‐based malicious PowerShell detection with feature optimizations | |
| Aebersold et al. | Detecting obfuscated javascripts using machine learning | |
| Van Overveldt et al. | FlashDetect: ActionScript 3 malware detection | |
| Phung et al. | Detection of malicious javascript on an imbalanced dataset | |
| El Boujnouni et al. | New malware detection framework based on N-grams and support vector domain description | |
| Patil et al. | Malware analysis using machine learning and deep learning techniques | |
| Gorji et al. | Detecting obfuscated JavaScript malware using sequences of internal function calls | |
| Mira et al. | Novel malware detection methods by using LCS and LCSS | |
| Alshamrani | Design and analysis of machine learning based technique for malware identification and classification of portable document format files | |
| Rozi et al. | Detecting malicious JavaScript using structure-based analysis of graph representation | |
| CN107368740B (en) | Detection method and system for executable codes in data file | |
| Jordan et al. | Safe-pdf: Robust detection of javascript pdf malware using abstract interpretation | |
| Ren et al. | JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation | |
| Nadeem et al. | Intelligent malware defenses | |
| Jordan et al. | Unacceptable behavior: Robust PDF malware detection using abstract interpretation | |
| Luh et al. | Advanced threat intelligence: detection and classification of anomalous behavior in system processes | |
| Suwais et al. | An Alternative Static Taint Analysis Framework to Detect PHP Web Shell-Based Web Attacks. |