About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I

Research Article

Assessing Adaptive Attacks Against Trained JavaScript Classifiers

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63086-7_12,
        author={Niels Hansen and Lorenzo De Carli and Drew Davidson},
        title={Assessing Adaptive Attacks Against Trained JavaScript Classifiers},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2020},
        month={12},
        keywords={JavaScript security Web security Adversarial ML},
        doi={10.1007/978-3-030-63086-7_12}
    }
    
  • Niels Hansen
    Lorenzo De Carli
    Drew Davidson
    Year: 2020
    Assessing Adaptive Attacks Against Trained JavaScript Classifiers
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-030-63086-7_12
Niels Hansen, Lorenzo De Carli,*, Drew Davidson
    *Contact email: ldecarli@wpi.edu

    Abstract

    In this work, we evaluate the security of heuristic- and machine learning-based classifiers for the detection of malicious JavaScript code. Due to the prevalence of web attacks directed though JavaScript injected into webpages, such defense mechanisms serve as a last-line of defense by classifying individual scripts as either benign or malicious. State-of-the-art classifiers work well at distinguishing currently-known malicious scripts from existing legitimate functionality, often by employing training sets of known benign or malicious samples. However, we observe that real-world attackers can beadaptive, and tailor their attacks to the benign content of the page and the defense mechanisms being used to defend the page.

    In this work, we consider a variety of techniques that an adaptive adversary may use to overcome JavaScript classifiers. We introduce a variety of new threat models that consider various types of adaptive adversaries, with varying knowledge of the classifier and dataset being used to detect malicious scripts. We show that while no heuristic defense mechanism is a silver bullet against an adaptive adversary, some techniques are far more effective than others. Thus, our work points to which techniques should be considered best practices in classifying malicious content, and a call to arms for more advanced classification.

    Keywords
    JavaScript security Web security Adversarial ML
    Published
    2020-12-12
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-63086-7_12
    Copyright © 2020–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL