![]() Then, the assembly code associated with the executable file can be studied so that the malicious intent of the suspicious file can be investigated. The executable file is submitted to the reverse engineering process. The state-of-the-art antivirus recommends preventively extracting features of suspicious files before execution 6. Note the impediment of conventional antiviruses for the vigor of large-scale and real-time administrations. Even so, more than one-third of evaluated commercial antivirus software is not aware of the existence of the JAR malware file under investigation. It is worth noting that in our research, the malicious behavior of the analyzed JAR malware was recorded by incident responders. In our paper, approximately 31.39% of antivirus software could not diagnose any kind of malicious sample. On average, 34.95% of virtual viruses were detected. The JAR malware detection range is from 0 to 99.10%, depending on the antivirus software. Thus, this paper proposes to study (i) 86 kinds of commercial antivirus software to identify Java malware files, especially JAR (Java ARchive) files. Similar to Oracle Java, commercial antivirus software can also identify malicious files with signature features. ![]() The modus operandi of the Java security manager is to identify malicious files based on signatures. ![]() One of the reasons for the failure of the Java security manager is the decrease in the catalog of new virtual viruses by its manufacturer. Microsoft Word, Adobe Reader, Microsoft Excel and Microsoft PowerPoint correspond to 3%, 3%, 2% and 1% of all monitored exploits 4. Java vulnerabilities correspond to 91% of all monitored exploits worldwide. Therefore, bank passwords, social networks, photos or private videos may be stolen due to cyber infections. Then, once on an endpoint, Java malware maliciously exploits daily activities, such as navigating the internet or using utilities. Java vulnerabilities usually target personal computers, technically named endpoints. They can work on approximately 3 billion devices, including servers, personal computers, printers, smartphones, tablets, smart credit cards, and household appliances 3.Ĭontrary to its popularity, incidents of targeted attacks using Java-based malware has been on the rise in recent years 4, 5 between 20, the number of vulnerabilities exploiting Java increased by more than 300% 5. ![]() The conclusion is that Java applications have good portability. It should be emphasized that the JVM has been implemented in thousands of OSs. Additionally, Java applications are portable, so they can be executed in any OS that includes a JVM (Java Virtual Machine) without modification or an extension. Unlike machine language instructions, Java applications are OS-independent. The goal of Java technology is to focus on creating applications that can be executed on various OSs (operating systems) and computer-controlled devices. From servers to personal computers to mobile and dedicated devices, Java applications have been used in various computers 2. In the United States, Java applications are present in 97% and 89% of company computers and personal computers, respectively 1. A large portion of the content provided by the global computer network is developed using Java technology. Currently, through the use of social network applications, global computer networks have spread widely, and their applications are concerned not only with entertainment and leisure but also with work.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |