
Research Article
Assessing Adaptive Attacks Against Trained JavaScript Classifiers
@INPROCEEDINGS{10.1007/978-3-030-63086-7_12, author={Niels Hansen and Lorenzo De Carli and Drew Davidson}, title={Assessing Adaptive Attacks Against Trained JavaScript Classifiers}, proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I}, proceedings_a={SECURECOMM}, year={2020}, month={12}, keywords={JavaScript security Web security Adversarial ML}, doi={10.1007/978-3-030-63086-7_12} }
- Niels Hansen
Lorenzo De Carli
Drew Davidson
Year: 2020
Assessing Adaptive Attacks Against Trained JavaScript Classifiers
SECURECOMM
Springer
DOI: 10.1007/978-3-030-63086-7_12
Abstract
In this work, we evaluate the security of heuristic- and machine learning-based classifiers for the detection of malicious JavaScript code. Due to the prevalence of web attacks directed though JavaScript injected into webpages, such defense mechanisms serve as a last-line of defense by classifying individual scripts as either benign or malicious. State-of-the-art classifiers work well at distinguishing currently-known malicious scripts from existing legitimate functionality, often by employing training sets of known benign or malicious samples. However, we observe that real-world attackers can beadaptive, and tailor their attacks to the benign content of the page and the defense mechanisms being used to defend the page.
In this work, we consider a variety of techniques that an adaptive adversary may use to overcome JavaScript classifiers. We introduce a variety of new threat models that consider various types of adaptive adversaries, with varying knowledge of the classifier and dataset being used to detect malicious scripts. We show that while no heuristic defense mechanism is a silver bullet against an adaptive adversary, some techniques are far more effective than others. Thus, our work points to which techniques should be considered best practices in classifying malicious content, and a call to arms for more advanced classification.