A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Jarhead analysis and detection of malicious Java applets
2012
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12
Therefore, we propose a novel approach to the detection of malicious Java applets based on static code analysis. ...
Unfortunately, the research community has not given to this problem the attention it deserves, and, as a consequence, the state-of-the-art approaches to the detection of malicious Java applets are based ...
Jarhead relies on static analysis and machine learning to detect malicious Java applets. Jarhead operates at the Java bytecode level. ...
doi:10.1145/2420950.2420988
dblp:conf/acsac/SchlumbergerKV12
fatcat:i22ysqglmbewrmmx6ftklintxq
Partial Evaluation for Java Malware Detection
[chapter]
2015
Lecture Notes in Computer Science
back into Java, improves the detection rates of a number of commercial AV products. ...
The paper presents a partial evaluator for Jimple, which is a typed three-address code suitable for optimisation and program analysis, and also demonstrates how the residual Jimple code, when transformed ...
One of the very few techniques that has addressed the problem of detecting malicious Java Applets is Jarhead [17] . ...
doi:10.1007/978-3-319-17822-6_8
fatcat:god76bdyozbfjbd6jhbp5dmiha
Detection of Obfuscation in Java Malware
2016
Procedia Computer Science
This paper proposes an analysis system to detect lexical and string obfuscation in Java malware. ...
Our experimental results based on a dataset of 375 malware samples containing 182927 strings and 12721 Java classes provide an accuracy of 99%. ...
The Jarhead tool 9 uses machine-learning algorithms for detecting obfuscation in such malicious applets. ...
doi:10.1016/j.procs.2016.02.097
fatcat:bzzs2qtb2ndvlkh2i3xmrbmrta
Partial evaluation of string obfuscations for Java malware detection
2016
Formal Aspects of Computing
, when transformed back into Java, improves the detection rates of a number of commercial AV products. ...
Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. ...
One of the very few techniques that has addressed the problem of detecting malicious Java Applets is Jarhead [SKV12] . ...
doi:10.1007/s00165-016-0357-3
fatcat:2evwy4qpkrfypg66w6cnvg2bfi