Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts

  • Gregory Blanc
  • , Daisuke Miyamoto
  • , Mitsuaki Akiyama
  • , Youki Kadobayashi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Obfuscation, code transformations that make the code unintelligible, is still an issue for web malware analysts and is still a weapon of choice for attackers. Worse, some researchers have arbitrarily decided to consider obfuscated contents as malicious although it has been proven wrong. Yet, we can assume than some web attack kits only feature a fraction of existing obfuscating transformations which may make it easy to detect malicious scripting contents. However, because of the undecidability on obfuscated contents, we propose to survey, classify and design deobfuscation methods for each obfuscating transformation. In this paper, we apply abstract syntax tree (AST) based methods to characterize obfuscating transformations found in malicious JavaScript samples. We are able to classify similar obfuscated codes based on AST fingerprints regardless of the original attack code. We are also able to quickly detect these obfuscating transformations by matching these in an analyzed sample's AST using a pushdown automaton (PDA). The PDA accepts a set of sub trees representing obfuscating transformations previously learned. Such quick and lightweight sub tree matching algorithm has the potential to detect obfuscated pieces of code in a script, to be later extracted for deobfuscation.

Original languageEnglish
Title of host publicationProceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
Pages344-351
Number of pages8
DOIs
Publication statusPublished - 14 May 2012
Externally publishedYes
Event26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 - Fukuoka, Japan
Duration: 26 Mar 201229 Mar 2012

Publication series

NameProceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012

Conference

Conference26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
Country/TerritoryJapan
CityFukuoka
Period26/03/1229/03/12

Keywords

  • JavaScript
  • abstract syntax tree
  • obfuscation

Fingerprint

Dive into the research topics of 'Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts'. Together they form a unique fingerprint.

Cite this