HoneyAgent: Detecting Malicious Java']Java Applets by Using Dynamic Analysis

被引:0
|
作者
Gassen, Jan [1 ]
Chapman, Jonathan P. [1 ]
机构
[1] Fraunhofer FKIE, Friedrich Ebert Allee 144, D-53113 Bonn, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work, we present HoneyAgent which allows for the dynamic analysis of Java applets, bypassing common obfuscation techniques. This enables security researchers to quickly comprehend the functionality of an examined applet and to unveil malicious behavior. In order to trace the behavior of a sample as far as possible, HoneyAgent is further able to simulate various vulnerabilities allowing analysts for example to identify the malware that should finally be installed by the applet. In our evaluation, we show that HoneyAgent is able to reliably detect malicious applets used by common exploit kits with no false positives. By using a combination of heuristics as well as signatures applied to observed method invocations, HoneyAgent is further able to identify exploited common vulnerabilities and exposures in many cases.
引用
收藏
页码:109 / 117
页数:9
相关论文
共 50 条
  • [21] Secure execution of Java']Java applets using a remote playground
    Malkhi, D
    Reiter, MK
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (12) : 1197 - 1209
  • [22] Java applets for the dynamic visualization of Voronoi diagrams
    Icking, Christian
    Klein, Rolf
    Köllner, Peter
    Ma, Lihong
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2598 : 191 - 205
  • [23] Are Java']Java applets independent programs?
    Ball, S
    Crawford, JM
    DR DOBBS JOURNAL, 1999, 24 (04): : 101 - +
  • [24] Developing a distance learning system using Java']Java applets
    Cadolini, P
    Davoli, F
    Marescotti, G
    Maryni, P
    IEEE GLOBECOM 1996 - GLOBAL INTERNET'96, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 63 - 66
  • [25] Secure execution of Java']Java applets using a remote playground
    Malkhi, D
    Reiter, MK
    Rubin, AD
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 40 - 51
  • [26] Application of Java']Java applets in environmental engineering
    Kumar, A
    Kulkarni, A
    ENVIRONMENTAL PROGRESS, 1999, 18 (01): : A12 - A15
  • [27] An infrastructure for network computing with Java']Java applets
    Baratloo, A
    Karaul, M
    Karl, H
    Kedem, ZM
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1998, 10 (11-13): : 1029 - 1041
  • [28] Creating signed, persistent Java']Java Applets
    Brigner, P
    DR DOBBS JOURNAL, 1999, 24 (02): : 82 - +
  • [29] Applications of Java']Java applets in electromagnetic simulation
    Fan, Y
    Li, EP
    Li, YL
    Li, LW
    APACE: 2003 ASIA-PACIFIC CONFERENCE ON APPLIED ELECTROMAGNETICS, PROCEEDINGS, 2003, : 132 - 136
  • [30] Educational Java']Java applets for MOS capacitor
    Saharil, F
    Hasbi, AM
    Hussin, H
    2004 IEEE International Conference on Semiconductor Electronics, Proceedings, 2004, : 627 - 630