HoneyAgent: Detecting Malicious Java']Java Applets by Using Dynamic Analysis

被引:0
|
作者
Gassen, Jan [1 ]
Chapman, Jonathan P. [1 ]
机构
[1] Fraunhofer FKIE, Friedrich Ebert Allee 144, D-53113 Bonn, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work, we present HoneyAgent which allows for the dynamic analysis of Java applets, bypassing common obfuscation techniques. This enables security researchers to quickly comprehend the functionality of an examined applet and to unveil malicious behavior. In order to trace the behavior of a sample as far as possible, HoneyAgent is further able to simulate various vulnerabilities allowing analysts for example to identify the malware that should finally be installed by the applet. In our evaluation, we show that HoneyAgent is able to reliably detect malicious applets used by common exploit kits with no false positives. By using a combination of heuristics as well as signatures applied to observed method invocations, HoneyAgent is further able to identify exploited common vulnerabilities and exposures in many cases.
引用
收藏
页码:109 / 117
页数:9
相关论文
共 50 条
  • [1] Static Analysis of Malicious Java']Java Applets
    Ganesh, Nikitha
    Di Troia, Fabio
    Corrado, Visaggio Aaron
    Austin, Thomas H.
    Stamp, Mark
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 58 - 63
  • [2] Jarhead Analysis and Detection of Malicious Java']Java Applets
    Schlumberger, Johannes
    Kruegel, Christopher
    Vigna, Giovanni
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 249 - 258
  • [3] Jarhead: Analysis and detection of malicious Java applets
    Schlumberger, J. (js@cs.ucsb.edu), 2012, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States
  • [4] Static Code Analysis and Detection of Multiple Malicious Java']Java Applets using SVM
    Salunkhe, Sapana Y.
    Pattewar, Tareek M.
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1538 - 1542
  • [5] Contrasting malicious applets by modifying the java']java virtual machine
    Ciaschini, V
    Gorrieri, R
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 47 - 64
  • [6] Coping with denial of service due to malicious Java']Java applets
    Florio, MF
    Gorrieri, R
    Marchetti, G
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1645 - 1654
  • [7] Detecting Attacks on Java']Java Cards by Fingerprinting Applets
    Morana, Giovanni
    Tramontana, Emiliano
    Zito, Daniele
    2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 359 - 364
  • [8] Security analysis of using Java']Java applets over WWW
    Zhou, BY
    MULTIMEDIA INFORMATION SYSTEMS IN PRACTICE, 1999, : 96 - 105
  • [9] Analysis of JAVA']JAVA security and hostile applets
    Brunnstein, K
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 293 - 295
  • [10] Java']Java applets for the dynamic visualization of Voronoi diagrams
    Icking, C
    Klein, R
    Köllner, P
    Ma, LH
    COMPUTER SCIENCE IN PERSPECTIVE: ESSAYS DEDICATED TO THOMAS OTTMANN, 2003, 2598 : 191 - 205