Using HTML5 to prevent detection of drive-by-download web malware

نویسندگان

  • Alfredo De Santis
  • Giancarlo De Maio
  • Umberto Ferraro Petrillo
چکیده

The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications. The results are web applications that look and feel almost like desktop applications while retaining the advantages of being originated from the web. However, these advancements come at a price. The same ∗This is the pre-peer reviewed version of the following article: Using HTML5 to Prevent Detection of Drive-by-Download Web Malware, which has been published in final form at http://dx.doi.org/10.1002/sec.1077. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. †Electronic address: [email protected] ‡Electronic address: [email protected] §Electronic address: [email protected]; Corresponding author 1 ar X iv :1 50 7. 03 46 7v 1 [ cs .C R ] 1 3 Ju l 2 01 5 technologies used to build responsive, pleasant and fully-featured web applications, can also be used to write web malware able to escape detection systems. In this article we present new obfuscation techniques, based on some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems. The proposed techniques have been experimented on a reference set of obfuscated malware. Our results show that the malware rewritten using our obfuscation techniques go undetected while being analyzed by a large number of detection systems. The same detection systems were able to correctly identify the same malware in its original unobfuscated form. We also provide some hints about how the existing malware detection systems can be modified in order to cope with these new techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of Malicious Url Redirection and Distribution

Web-based malicious software (malware) has been increasing over the Internet .It poses threats to computer users through web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it .these attacks evade detection by using automatic redirections to various websi...

متن کامل

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today’s cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribut...

متن کامل

Drive-by Download Attacks: Effects and Detection Methods

The aim of this study is to present and analyze the problem of drive-by download attacks. Drive-by downloads have become one of the most common ways to infect a large group of unsuspected users. Attackers take full advantage of the functionality of the Internet and its dominance in various transactions of everyday life and spread malware by exploiting vulnerable systems for financial gain. Thes...

متن کامل

VILEEAR: Detection of Drive by Download attack on Malicious Web Pages

Internet is a platform which is mostly used to spread malicious software and viruses on the network. The drive by download (DBD) is most successful and popular attack invented by web site attacker till date. Drive by download attack enables the victims to click coded malicious links and the browser will be redirected to malicious web sites to exploit vulnerabilities, and also it installs softwa...

متن کامل

Anatomy of Drive-by Download Attack

Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed in the literature. However, each proposed method uses different content feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015