In this research, we consider the problem of detecting malicious Java applets, based on static analysis. In general, dynamic analysis is more informative, but static analysis is more efficient, and hence more practical. Consequently, static analysis is preferred, provided we can obtain results comparable to those obtained using dynamic analysis. We conducted experiments with the machine learning technique, Hidden Markov Model (HMM). We show that in some cases a static technique can detect malicious Java applets with greater accuracy than previously published research that relied on dynamic analysis
This thesis addresses several aspects of using static code analysis tools for detection of security ...
The Java Card API provides a framework of classes and interfaces that hides the details of the under...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
In this research, we consider the problem of detecting malicious Java applets, based on static analy...
Static analysis relies on features extracted without executing code, while dynamic analysis extracts...
Static analysis relies on features extracted without executing code, while dynamic analysis extracts...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
Source code is rich with signs carrying meaning that is incomprehensible to a compiler, but importan...
Well-designed malware can evade static detection techniques, such as signature scanning. Dynamic ana...
Well-designed malware can evade static detection techniques, such as signature scanning. Dynamic ana...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
In this research, we explore the field of dynamic analysis which has shown promis- ing results in th...
In this research, we explore the field of dynamic analysis which has shown promis- ing results in th...
This thesis addresses several aspects of using static code analysis tools for detection of security ...
The Java Card API provides a framework of classes and interfaces that hides the details of the under...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
In this research, we consider the problem of detecting malicious Java applets, based on static analy...
Static analysis relies on features extracted without executing code, while dynamic analysis extracts...
Static analysis relies on features extracted without executing code, while dynamic analysis extracts...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
Source code is rich with signs carrying meaning that is incomprehensible to a compiler, but importan...
Well-designed malware can evade static detection techniques, such as signature scanning. Dynamic ana...
Well-designed malware can evade static detection techniques, such as signature scanning. Dynamic ana...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
In this research, we explore the field of dynamic analysis which has shown promis- ing results in th...
In this research, we explore the field of dynamic analysis which has shown promis- ing results in th...
This thesis addresses several aspects of using static code analysis tools for detection of security ...
The Java Card API provides a framework of classes and interfaces that hides the details of the under...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...