...
首页> 外文期刊>IEICE transactions on information and systems >Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
【24h】

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences

机译:通过分析重定向差异来识别恶意网站中的逃避代码

获取原文
           

摘要

Security researchers/vendors detect malicious websites based on several website features extracted by honeyclient analysis. However, web-based attacks continue to be more sophisticated along with the development of countermeasure techniques. Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. The evasive code indirectly identifies vulnerable clients by abusing the differences among JavaScript implementations. Attackers deliver malware only to targeted clients on the basis of the evasion results while avoiding honeyclient analysis. Therefore, we are faced with a problem in that honeyclients cannot analyze malicious websites. Nevertheless, we can observe the evasion nature, i.e., the results in accessing malicious websites by using targeted clients are different from those by using honeyclients. In this paper, we propose a method of extracting evasive code by leveraging the above differences to investigate current evasion techniques. Our method analyzes HTTP transactions of the same website obtained using two types of clients, a real browser as a targeted client and a browser emulator as a honeyclient. As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript implementations. These findings will contribute to improving the analysis capabilities of conventional honeyclients.
机译:安全研究人员/供应商根据honeyclient分析提取的几种网站功能来检测恶意网站。但是,随着对策技术的发展,基于Web的攻击继续变得更加复杂。攻击者使用复杂的JavaScript代码检测honeyclient并逃避分析。逃避性代码通过滥用JavaScript实现之间的差异来间接识别易受攻击的客户端。攻击者根据逃避的结果仅向目标客户端分发恶意软件,同时避免进行honeyclient分析。因此,我们面临一个问题,那就是honeyclients无法分析恶意网站。但是,我们可以观察到回避的本质,即使用目标客户端访问恶意网站的结果与使用honeyclients的结果不同。在本文中,我们提出了一种利用以上差异来研究当前规避技术的方法来提取规避代码。我们的方法分析使用两种类型的客户端(作为目标客户端的真实浏览器和作为honeyclient的浏览器仿真器)获得的同一网站的HTTP交易。通过在20,272个恶意网站中执行的8,467个JavaScript样本对我们的方法进行评估的结果,我们发现了以前未知的规避技术,这些技术滥用了JavaScript实现之间的差异。这些发现将有助于提高常规蜜客户端的分析能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号