HoneyAgent: Detecting Malicious Java']Java Applets by Using Dynamic Analysis

被引:0
|
作者
Gassen, Jan [1 ]
Chapman, Jonathan P. [1 ]
机构
[1] Fraunhofer FKIE, Friedrich Ebert Allee 144, D-53113 Bonn, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work, we present HoneyAgent which allows for the dynamic analysis of Java applets, bypassing common obfuscation techniques. This enables security researchers to quickly comprehend the functionality of an examined applet and to unveil malicious behavior. In order to trace the behavior of a sample as far as possible, HoneyAgent is further able to simulate various vulnerabilities allowing analysts for example to identify the malware that should finally be installed by the applet. In our evaluation, we show that HoneyAgent is able to reliably detect malicious applets used by common exploit kits with no false positives. By using a combination of heuristics as well as signatures applied to observed method invocations, HoneyAgent is further able to identify exploited common vulnerabilities and exposures in many cases.
引用
收藏
页码:109 / 117
页数:9
相关论文
共 50 条
  • [31] Developing Java']Java applets for Electrical Machine using beans technology
    Ho, W
    Banh, L
    Jeong, KY
    ICEMS 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON ELECTRICAL MACHINES AND SYSTEMS, VOLS 1 AND 2, 2003, : 947 - 950
  • [32] Detecting malicious Java']JavaScript code based on semantic analysis
    Fang, Yong
    Huang, Cheng
    Su, Yu
    Qiu, Yaoyao
    COMPUTERS & SECURITY, 2020, 93
  • [33] Chemistry visualization using Java']Java applets and HTML']HTML.
    Walden, SE
    Estrada, CN
    Horie, T
    Molinaro, M
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1998, 216 : U691 - U691
  • [34] Secure WWW transactions using standard HTTP and Java']Java applets
    Bergadano, F
    Crispo, B
    Eccettuato, M
    PROCEEDINGS OF THE 3RD USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1998, : 109 - 119
  • [35] Java']Java applets copy protection by steganography
    Shirali-Shahreza, Mohammad
    IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 388 - 391
  • [36] Utilization of Java']Java Applets for gear optimization
    Amin, N
    Su, D
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON GEARING, TRANSMISSIONS, AND MECHANICAL SYSTEMS, 2000, : 425 - 433
  • [37] Detecting malicious Java']JavaScript code in Mozilla
    Hallaraker, O
    Vigna, G
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
  • [38] Detecting Malicious Behaviors in Java']JavaScript Applications
    Mao, Jian
    Bian, Jingdong
    Bai, Guangdong
    Wang, Ruilong
    Chen, Yue
    Xiao, Yinhao
    Liang, Zhenkai
    IEEE ACCESS, 2018, 6 : 12284 - 12294
  • [39] Detecting Malicious Java']JavaScript Using Structure-Based Analysis of Graph Representation
    Rozi, Muhammad Fakhrur
    Ban, Tao
    Ozawa, Seiichi
    Yamada, Akira
    Takahashi, Takeshi
    Kim, Sangwook
    Inoue, Daisuke
    IEEE ACCESS, 2023, 11 : 102727 - 102745
  • [40] Rule-based filtering for Java']Java applets
    Iglio, P
    Fraticelli, F
    Giuri, L
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 112 - 119