The Web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast pace with the aim of narrowing the gap between web‐based applications and traditional desktop applications. The results are web applications that look and feel almost like desktop applications while retaining the advantages of being originated from the Web. However, these advancements come at a price. The same technologies used to build responsive, pleasant, and fully featured web applications can also be used to write web malware able to escape detection systems. In this article, we present new obfuscation techniques, on the basis of some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems. The proposed techniques have been experimented on a reference set of obfuscated malware. Our results show that the malware rewritten using our obfuscation techniques goes undetected while being analyzed by a large number of detection systems. The same detection systems were able to correctly identify the same malware in its original unobfuscated form. We also provide some hints about how the existing malware detection systems can be modified in order to cope with these new techniques.

Using HTML5 to prevent detection of drive-by-download web malware / Alfredo De, Santis; Giancarlo De, Maio; FERRARO PETRILLO, Umberto. - In: SECURITY AND COMMUNICATION NETWORKS. - ISSN 1939-0114. - ELETTRONICO. - 8:7(2015), pp. 1237-1255. [10.1002/sec.1077]

Using HTML5 to prevent detection of drive-by-download web malware

FERRARO PETRILLO, UMBERTO
2015

Abstract

The Web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast pace with the aim of narrowing the gap between web‐based applications and traditional desktop applications. The results are web applications that look and feel almost like desktop applications while retaining the advantages of being originated from the Web. However, these advancements come at a price. The same technologies used to build responsive, pleasant, and fully featured web applications can also be used to write web malware able to escape detection systems. In this article, we present new obfuscation techniques, on the basis of some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems. The proposed techniques have been experimented on a reference set of obfuscated malware. Our results show that the malware rewritten using our obfuscation techniques goes undetected while being analyzed by a large number of detection systems. The same detection systems were able to correctly identify the same malware in its original unobfuscated form. We also provide some hints about how the existing malware detection systems can be modified in order to cope with these new techniques.
2015
malware html5 obfuscation
01 Pubblicazione su rivista::01a Articolo in rivista
Using HTML5 to prevent detection of drive-by-download web malware / Alfredo De, Santis; Giancarlo De, Maio; FERRARO PETRILLO, Umberto. - In: SECURITY AND COMMUNICATION NETWORKS. - ISSN 1939-0114. - ELETTRONICO. - 8:7(2015), pp. 1237-1255. [10.1002/sec.1077]
File allegati a questo prodotto
File Dimensione Formato  
De Santis_Using-HTML5_2015.pdf

accesso aperto

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.41 MB
Formato Adobe PDF
1.41 MB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/644795
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact