29 jjencode JavaScript

Similar documents
三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果

7,, i

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i


28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

Drive-by-Download JavaScript

1 1 tf-idf tf-idf i

Web Basic Web SAS-2 Web SAS-2 i

Kyushu Communication Studies 第2号

kut-paper-template.dvi

Q-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN i

soturon.dvi

,,,,., C Java,,.,,.,., ,,.,, i

Web Web Web Web Web, i

, IT.,.,..,.. i

16_.....E...._.I.v2006

untitled

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i


Admissions Assistance Office


ABSTRACT The movement to increase the adult literacy rate in Nepal has been growing since democratization in In recent years, about 300,000 peop

28 Horizontal angle correction using straight line detection in an equirectangular image

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i


先端社会研究所紀要 第9号☆/2.島村

Vol.57 No

1.

(1) a. He has gone already. b. He hasn't gone yet. c. Has he gone yet?

A5 PDF.pwd

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

untitled

25 Removal of the fricative sounds that occur in the electronic stethoscope

2 10 The Bulletin of Meiji University of Integrative Medicine 1,2 II 1 Web PubMed elbow pain baseball elbow little leaguer s elbow acupun

220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4



IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

fiš„v5.dvi

中日七夕伝説における天の川の生成に関する比較研究 楊静芳 一 先行研究及び問題意識 キーワード :

,,,, : - i -

〈論文〉近代日本の社会事業雑誌 : 『教誨叢書』


(1) i NGO ii (2) 112

環境影響評価制度をめぐる法的諸問題(4) : 米国の環境影響評価制度について

72 はじめに 論文(査読論文)永禄三年の車争い図屏風The Screen Painting Confrontation of Carriages Produced in the Third Year of Eiroku(1560) Yoshiyuki TAKAMATSU

2 1 ( ) 2 ( ) i

- 17 -


1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

2 ( ) i



ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit


石屋製菓のクライシス・マネジメント考 : 地域貢献型レピュテーションを信頼回復に生かす


06’ÓŠ¹/ŒØŒì



2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google


鹿大広報149号

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada





生活設計とパーソナル・ファイナンスに関する一視点*

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

Copyright 2008 by Tomoyoshi Yamazaki

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf


Transcription:

Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

29 jjencode JavaScript 1180357 2018 2 28

jjencode JavaScript Web JavaScript Web JavaScript Web jjencode JavaScript jjencode i

Abstract Koryo NAKAMURA In recent years, a drive-by download attack of infecting malware by browsing a tampered legitimate website has been reported. Most of the malicious JavaScript used for attacks has been treated as obfuscated, but obfuscation may be applied to JavaScript on common Web sites as well. Obfuscation research that can be used for attacks in this way but can also be used on ordinary malicious Web sites is important. Among various obfuscation methods, there is a relatively new method of converting to a code with only symbols. However, there are still few studies targeting obfuscation method where obfuscated code becomes only symbols. Nishida s method, which is an existing research, is effective for this obfuscation method, but the method had a problem that verification of the feature acquired by machine learning was not sufficient. In this paper, we aimed to verify whether obfuscation can be detected if the code after obfuscation is only a symbol. In addition, we verify what can be distinguished by using the character appearance frequency. This experiment showed that it was possible to discriminate between code obfuscated by jjencode and general code, and it became clear that obfuscation can be learned by using the existing method. key words JavaScript obfuscation jjencode ii

1 1 1.1.................................. 1 1.2................................. 2 2 3 2.1................................. 3 2.1.1............................... 4 2.1.2............................... 4 2.1.3............................... 4 2.1.4............................... 4 2.2.................................. 5 2.2.1.......................... 6 2.2.2.................... 6 2.2.3......................... 6 2.2.4.............. 6 2.3................................... 7 2.3.1................................ 7 2.3.2................................ 8 3 9 3.1 JavaScript........................ 9 3.2................................. 9 3.3................................. 10 3.4 SVM............................... 11 iii

3.5.......................... 11 4 12 4.1...................................... 12 4.1.1 Web................. 13 4.1.2....................... 13 4.1.3.......................... 14 4.1.4......................... 15 4.1.5 SVM........................ 15 4.1.6................................ 16 5 17 6 19 20 21 iv

2.1............................... 5 2.2............................... 5 2.3-1........................ 7 2.4 false..................... 7 2.5 f....................... 7 2.6 jjencode.................... 8 4.1......................... 14 v

2.1................................ 3 3.1.............................. 10 4.1 JavaScirpt......................... 13 4.2 5......................... 15 vi

1 1.1 Web [1] JavaScript JavaScript Web Web jjencode [2] JavaScript [3] 1

1.2 1.2 6 2 3 JavaScript 4 5 6 2

2 JavaScript 2.1 4 2.1 2.1 3

2.1 2.1.1 2.1.2 2.1.3 Web Web HTML id 2.1.4 4

2.2 2.2 jjencode 2.1 JavaScript Obfuscator Tool[4] 2.2 2.1 Hello World! 2.2 2.1 2.2 2.1 2.2 5

2.2 2.2.1 2.2.2 2.2.3 Unicode 2.2.4 JavaScript 2.3 2.4 2.5 JavaScript 2.3 1 2.4 6

2.3 2.3-1 2.4 false false 2.5 f 2.3 2.4 2.5 2.6 2.6 jjencode [5] 2.3 JavaScript [6] JavaScript 2.3.1 JavaScript 2.5 f 7

2.3 2.6 jjencode 2.3.2 JavaScript scirpt JavaScript 8

3 JavaScript 3.1 JavaScript JavaScript JavaScript 3.2 MWS Dataset 2013[7] D3M Web Alexa[8] 500 Web JavaScript 9

3.3 1KB 3.3 ASCII 0x21 0x7e 96 96 3.1 3.1 16 [A-Z] [a-z] 0x41-0x5a 0x61-0x7a [0-9] 0x30-0x39 0x21-0x2f 0x3a-0x40 0x5b-0x60 0x7b-0x7e i m i N F (i) (3.1) (3.2) N = n m i (3.1) i F (i) = m i N (3.2) F (i) 0 1 10

3.4 SVM 3.4 SVM SVM(Support Vector Machine) 2 [9] 96 96 SVM 3.5 SVM RBF( ) C = 25.22 = 55.72 98.84% (accuracy) 11

4 jjencode jjencode 4.1 1. Web 2. jjencode 3. 4. 5. SVM 12

4.1 4.1.1 Web Web Alexa Top 500 Global Sites Web Alexa 10 script JavaScript script JavaScript JavaScript 438 4.1 Web JavaScript 4.1 JavaScirpt 438 14,754,808 bites 33,687 bites 1,682,739 bites 23 bites 1KB JavaScript JavaScript jjencode 1KB Web 4.1.2 jjencode MWS Dataset 2013 D3M 13

4.1 Web 2 4.1.3 ASCII 0x21 0x7e 94 0 1 4.1 4.1 jjencode 0x21 0x7e 14

4.1 4.2 5. e t a n (0x2e) (0x65) (0x74) (0x61) (0x6e) 0.055343 0.055101 0.051603 0.051199 0.046320 $ +. (0x24) (0x5f) (0x2b) (0x2e) (0x22) 0.309287 0.196983 0.167870 0.129734 0.088579 4.2 4.1 5 jjencode 4.1.4 Web jjencode 438 4.1.5 SVM SVM 96 10 15

4.1 4.1.6 RBF C = 1 = 1 100% 16

5 jjencode 100% jjencode 100% 1KB jjencode aaencode Web 17

Web Web Web Web 18

6 jjencode jjencode jjencode 19

20

[1] Information-technology Promotion Agency, Japan IPA, 2016 1 IPA, https://www.ipa.go.jp/security/txt/ 2016/01outline.html, 2018. [2] Yosuke HASEGAWA, JavaScript, https://www.slideshare.net/ hasegawayosuke/javascript-51570525, 2018. [3],,,,,, JavaScript, Vol.2014-CSEC-64, No.21, pp.1-7, 2014. [4] Tiago Serafim, JavaScript Obfuscator Tool, https://javascriptobfuscator. herokuapp.com/, 2018. [5] Yosuke HASEGAWA, jjencode - Encode any JavaScript program using only symbols, http://utf-8.jp/public/jjencode.html, 2018. [6],,,, JavaScript, Vol.2014-DPS-161, No.17, pp.1-7, 2014. [7],,,,,, MWS Datasets 2013, Computer Security Symposium 2013, 2013. [8] Alexa Internet, Inc., Alexa Top 500 Global Sites, https://www.alexa.com/ topsites, 2018. [9],,, 2012. 21