000 02268nam  2200337za 4500
0019.854523
003CaOODSP
00520240221113057
007cr |||||||||||
008180328s2017    quc     ob   f000 0 eng d
040 |aCaOODSP|beng
043 |an-cn---
0861 |aD68-10/118-2017E-PDF
24500|aIntroduction to SinJAR (a new tool for reverse engineering Java applications) and tracing its malicious actions using hidden Markov models |h[electronic resource] / |cJaouhar Fattahi ... [et al.].
260 |a[Valcartier, QC] : |bDefence Research and Development Canada, |c2017.
300 |a[17] p.
4901 |aExternal literature (P) ; |vDRDC-RDDC-2017-P118
500 |aCover title.
500 |a"Can unclassified."
500 |a"December 2017."
500 |aOriginally published in: Frontiers in artificial intelligence and applications, vol. 297, p. 441-453, Nov. 2017.
504 |aIncludes bibliographical references.
5203 |a"In this paper, we are proposing a new tool for reversing Java applications called SinJAR. SinJAR is a lightweight software written in Java aiming at inspecting bytecode at compile time and producing the structure tree of a targeted application. Besides, it is able to detect vulnerabilities and security weaknesses inside the Java code. SinJAR can be used for two purposes. The first one is sane and consists in using it to verify whether or not an application is safe and compliant with its specification. The second one is malicious and consists in spying applications through their bytecode and exploiting vulnerabilities that they may enclose. In this paper, we will show how to detect SinJAR malicious actions after showing the capabilities of the tool through few ad hoc attack scenarios conducted in a real military context”--Abstract.
69207|2gccst|aComputer security
69207|2gccst|aSoftware
693 4|aJava (Computer program language)
693 4|aMarkov processes
7001 |aFattahi, Jaouhar.
7101 |aDefence R&D Canada. |bValcartier Research Centre.
830#0|aExternal literature (P) (Defence R&D Canada)|vDRDC-RDDC-2017-P118.|w(CaOODSP)9.854437
85640|qPDF|s926 KB|uhttps://publications.gc.ca/collections/collection_2018/rddc-drdc/D68-10-118-2017-eng.pdf