Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im
{"title":"恶意javascript攻击签名自动生成技术","authors":"Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im","doi":"10.1109/ICMIC.2014.7020779","DOIUrl":null,"url":null,"abstract":"Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.","PeriodicalId":405363,"journal":{"name":"Proceedings of 2014 International Conference on Modelling, Identification & Control","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Automatic attack signature generation technology for malicious javascript\",\"authors\":\"Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im\",\"doi\":\"10.1109/ICMIC.2014.7020779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.\",\"PeriodicalId\":405363,\"journal\":{\"name\":\"Proceedings of 2014 International Conference on Modelling, Identification & Control\",\"volume\":\"119 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2014 International Conference on Modelling, Identification & Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMIC.2014.7020779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2014 International Conference on Modelling, Identification & Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMIC.2014.7020779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automatic attack signature generation technology for malicious javascript
Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.