2014
DOI: 10.1007/s11416-014-0225-8
|View full text |Cite
|
Sign up to set email alerts
|

Hunting for metamorphic JavaScript malware

Abstract: Hunting For Metamorphic JavaScript Malware by Mangesh MusaleInternet plays a major role in the propagation of malware. A recent trend is the infection of machines through web pages, often due to malicious code inserted in JavaScript. From the malware writer's perspective, one potential advantage of JavaScript is that powerful code obfuscation techniques can be applied to evade detection. In this research, we analyze metamorphic JavaScript malware. We compare the effectiveness of several static detection strate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(43 citation statements)
references
References 21 publications
0
43
0
Order By: Relevance
“…The result is not very promising for MWOR with high padding ratio although area under the curve (AUC) is quite well for lower padding ratio. In [19] authors illustrate that OGS is a reliable method for Javascript metamorphic mal ware detection. It has better accuracy than HMM and other well-known methods for metamorphic malware detection.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The result is not very promising for MWOR with high padding ratio although area under the curve (AUC) is quite well for lower padding ratio. In [19] authors illustrate that OGS is a reliable method for Javascript metamorphic mal ware detection. It has better accuracy than HMM and other well-known methods for metamorphic malware detection.…”
Section: Resultsmentioning
confidence: 99%
“…Future work could include detailed examination on the parameters of the proposed approach. In addition, with regard to [19], it is possible that Improved OGS would have better accuracy for Javascript malware detection. Therefore, using our method for Javascript mal ware detection could leads to interesting result.…”
Section: Resultsmentioning
confidence: 99%
“…This technique is quite often used and 76 of Trojans analysed have indicated utilisation of this technique (see Appendix II). While this technique could be circumvented by removing ineffective instructions prior to analysis, detecting those instructions is quite time consuming [26], [74]- [78].…”
Section: Anti-forensics Techniquesmentioning
confidence: 99%
“…One of such technique is Hidden Markov Model (HMM), which is one of the most popular machine learning techniques used in the field of malware detection [26]. In this technique, a Hidden Markov Model is trained against known malware opcode sequence [17]. Once the training phase is over, the trained model is used to score incoming files.…”
Section: Hidden Markov Model Based Detectionmentioning
confidence: 99%