The drastic increase of JavaScript exploitation attacks has led to a strong interest in developing techniques to enable malicious JavaScript analysis. Existing analysis tech- niques fall into two general categories: static analysis and dynamic analysis. Static analysis tends to produce inaccurate results (both false positive and false negative) and is vulnerable to a wide series of obfuscation techniques. Thus, dynamic analysis is constantly gaining popularity for exposing the typical features of malicious JavaScript. However, existing dynamic analysis techniques possess limitations such as limited code coverage and incomplete environment setup, leaving a broad attack surface for evading the detection. To overcome these limitations, we present the design and implementation of a novel JavaScript forced execution engine named JSForce which drives an arbitrary JavaScript snippet to execute along different paths without any input or environment setup. We evaluate JSForce using 220,587 HTML and 23,509 PDF real- world samples. Experimental results show that by adopting our forced execution engine, the malicious JavaScript detection rate can be substantially boosted by 206.29% using same detection policy without any noticeable false positive increase. We also make JSForce publicly available as an online service and will release the source code to the security community upon the acceptance for publication.
翻译:JavaScript 开发攻击的急剧增加导致人们强烈关注开发技术,以便能够进行恶意 JavaScript 分析。现有的分析技术芯片可分为两大类:静态分析和动态分析。静态分析往往产生不准确的结果(假正反反反反反反),容易受到一系列令人迷惑的技术的影响。因此,动态分析在暴露恶意JavaScript 的典型特征方面越来越受欢迎。然而,现有的动态分析技术具有局限性,例如代码覆盖范围有限,环境设置不全,留下一个广泛的攻击面以躲避探测。为了克服这些限制,我们提出设计和实施名为 JavaScript 的新型强迫处决引擎JusForce 的设计和实施过程不准确( JavaScript 片片段的设计和实施过程) 。我们用220,587 HTML 和23,509 PDF 真实的世界样本来评估JS Force 。实验结果显示,通过我们的强制处决引擎,恶意JavaScript 检测率率可以大大提高206.2.9% 使用相同的检测政策,使用相同的检测能力,使用相同的检测政策,从而将在线发布。我们。我们的网站将公开提供。在网上版本。