JMD: A Hybrid Approach for Detecting Java Malware

نویسندگان

  • Adrian Herrera
  • Ben Cheney
چکیده

With the rapid rise in the number of exploits targeting the Java runtime environment, new tools are required to detect these malicious Java applications. This paper proposes one such tool, the Java Malware Detector (JMD). JMD takes a hybrid approach that combines symbolic execution, instrumentation and dynamic analysis to detect malware that subverts Java’s access control mechanisms. Using this approach, we aim to derive any trigger conditions that may exist before instrumenting and executing the malware in a controlled environment to observe whether it escapes the Java security sandbox. A key element of this approach is our use of existing open-source software platforms—specifically, Java Pathfinder and AspectJ. By using real-world Java malware samples we are able to evaluate the effectiveness of JMD. The results of this evaluation show that JMD’s instrumentation and dynamic analysis capabilities provide an effective tool for detecting a wide range of Java malware: we successfully detected malware variants that represent fourteen of the known access control-related CVEs disclosed over the past four years. However, our success in using symbolic execution to derive trigger conditions was limited, mainly due to the incomplete state of the String handling implementation in Java Pathfinder’s symbolic execution plugin.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices

Malware attacks become more frequently in cellular networks (i e., viruses, worms, and also other malicious software). Spyware which disturbs your network computer function, hacking the hypersensitive information and accesses your private systems. It is only a program that's specifically designed to be able to injure the computer it can be a virus or perhaps worm. Mobile malware can propagate v...

متن کامل

Hybrid Model for Detecting Viruses in Mobile Networks

Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-layer network model is presented for simulating virus propagation through both Bluetooth and SMS. T...

متن کامل

A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm

Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...

متن کامل

A comparative study of static, dynamic and hybrid analysis techniques for android malware detection

With the popularity and increase in the number of smartphone users, the spread of mobile malware on Android platform has increased. Current intelligent terminal based on the Android has occupied most of the market, and the number of malware aiming at Android platform is also increasing with the increase in the smartphone users. The popularity of the smartphones, the large market share of androi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015