2015 the International Symposium on Artificial Intelligence and Signal Processing (AISP) 2015
DOI: 10.1109/aisp.2015.7123508
|View full text |Cite
|
Sign up to set email alerts
|

JSObfusDetector: A binary PSO-based one-class classifier ensemble to detect obfuscated JavaScript code

Abstract: JavaScript code obfuscation has become a major technique used by malware writers to evade static analysis techniques. Over the past years, a number of dynamic analysis techniques have been proposed to detect obfuscated malicious JavaScript code at runtime. However, because of their runtime overheads, these techniques are slow and thus not widely used in practice. On the other hand, since a large quantity of benign JavaScript code is obfuscated to protect intellectual property, it is not effective to use the in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…The PIN will be obfuscated by randomizing the placement of the real PIN within the 10-digit number. Randomization obfuscation is a technique that randomly inserts or changes some elements of code without changing the semantics (Jodavi et al, 2015). Though this method is commonly applied by researchers in data mining and databases, it can be applied equally in the production of a usable dataset that can be directly displayed to end users, and this is supported by data obfuscation (Baken et al, 2004).…”
Section: "Randomization Obfuscation" Techniquementioning
confidence: 99%
“…The PIN will be obfuscated by randomizing the placement of the real PIN within the 10-digit number. Randomization obfuscation is a technique that randomly inserts or changes some elements of code without changing the semantics (Jodavi et al, 2015). Though this method is commonly applied by researchers in data mining and databases, it can be applied equally in the production of a usable dataset that can be directly displayed to end users, and this is supported by data obfuscation (Baken et al, 2004).…”
Section: "Randomization Obfuscation" Techniquementioning
confidence: 99%
“…Jodavi et al [19] worked on a novel classifier ensemble approach called JSObfusDetector to identify vulnerable JS code. An ensemble of a one-class SVM classifier was used with a binary particle swarm optimization algorithm.…”
Section: A Description Of Primary Studies (Ps)mentioning
confidence: 99%
“…We use binary coding method to encode the resource allocation problem. A chromosome represents a resource allocation plan.…”
Section: On‐line Decision‐making Based On Genetic Algorithmmentioning
confidence: 99%