Title
Finding malware on a web scale
Abstract
In recent years, attacks that exploit vulnerabilities in browsers and their associated plugins have increased significantly. These attacks are often written in JavaScript and millions of URLs contain such malicious content. Over the last several years, we have created a series of techniques designed to detect and prevent malicious software or malware. These techniques focus on detecting malware that infects web pages. Much of this research has been done in close collaboration with a major search engine, Bing, which is interested in making sure it does not present malicious results to its users, independently of the user's browser, location, or operating system. As such, detection needs to be as general and wide-reaching as possible. While some of the techniques summarized below can be deployed within a web browser, our primary deployment model involves crawling the web in an effort to find and blacklist malicious pages. In the rest of this paper, we will summarize three related projects: Nozzle, Zozzle, and Rozzle. Nozzle is a runtime malware detector. Zozzle is a a mostly static malware detector. Finally, Rozzle is a de-cloacking technique that amplifies both.
Year
DOI
Venue
2012
10.1007/978-3-642-33704-8_1
MMM-ACNS
Keywords
Field
DocType
close collaboration,malicious page,static malware detector,present malicious result,web scale,malicious content,web browser,infects web page,malicious software,associated plugins,runtime malware detector
Cryptovirology,World Wide Web,Web threat,Web page,Computer science,Computer security,Blacklist,Exploit,Plug-in,Malware,JavaScript
Conference
Citations 
PageRank 
References 
1
0.43
3
Authors
5
Name
Order
Citations
PageRank
Ben Livshits12108123.83
Ben Zorn210.77
Christian Seifert3996.11
Charlie Curtsinger433912.95
Heap Spraying510.43