Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christian Seifert is active.

Publication


Featured researches published by Christian Seifert.


ieee symposium on security and privacy | 2012

Rozzle: De-cloaking Internet Malware

Clemens Kolbitsch; Benjamin Livshits; Benjamin G. Zorn; Christian Seifert

JavaScript-based malware attacks have increased in recent years and currently represent a signicant threat to the use of desktop computers, smartphones, and tablets. While static and runtime methods for malware detection have been proposed in the literature, both on the client side, for just-in-time in-browser detection, as well as offline, crawler-based malware discovery, these approaches encounter the same fundamental limitation. Web-based malware tends to be environment-specific, targeting a particular browser, often attacking specic versions of installed plugins. This targeting occurs because the malware exploits vulnerabilities in specific plugins and fails otherwise. As a result, a fundamental limitation for detecting a piece of malware is that malware is triggered infrequently, only showing itself when the right environment is present. We observe that, using fingerprinting techniques that capture and exploit unique properties of browser configurations, almost all existing malware can be made virtually impssible for malware scanners to detect. This paper proposes Rozzle, a JavaScript multi-execution virtual machine, as a way to explore multiple execution paths within a single execution so that environment-specific malware will reveal itself. Using large-scale experiments, we show that Rozzle increases the detection rate for offline runtime detection by almost seven times. In addition, Rozzle triples the effectiveness of online runtime detection. We show that Rozzle incurs virtually no runtime overhead and allows us to replace multiple VMs running different browser configurations with a single Rozzle-enabled browser, reducing the hardware requirements, network bandwidth, and power consumption.


international world wide web conferences | 2011

ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads

Junjie Zhang; Christian Seifert; Jack W. Stokes; Wenke Lee

A drive-by download attack occurs when a user visits a webpage which attempts to automatically download malware without the users consent. Attackers sometimes use a malware distribution network (MDN) to manage a large number of malicious webpages, exploits, and malware executables. In this paper, we provide a new method to determine these MDNs from the secondary URLs and redirect chains recorded by a high-interaction client honeypot. In addition, we propose a novel drive-by download detection method. Instead of depending on the malicious content used by previous methods, our algorithm first identifies and then leverages the URLs of the MDNs central servers, where a central server is a common server shared by a large percentage of the drive-by download attacks in the same MDN. A set of regular expression-based signatures are then generated based on the URLs of each central server. This method allows additional malicious webpages to be identified which launched but failed to execute a successful drive-by download attack. The new drive-by detection system named ARROW has been implemented, and we provide a large-scale evaluation on the output of a production drive-by detection system. The experimental results demonstrate the effectiveness of our method, where the detection coverage has been boosted by 96% with an extremely low false positive rate.


international conference on acoustics, speech, and signal processing | 2013

Robust scareware image detection

Christian Seifert; Jack W. Stokes; Christina Colcernian; John Platt; Long Lu

In this paper, we propose an image-based detection method to identify web-based scareware attacks that is robust to evasion techniques. We evaluate the method on a large-scale data set that resulted in an equal error rate of 0.018%. Conceptually, false positives may occur when a visual element, such as a red shield, is embedded in a benign page. We suggest including additional orthogonal features or employing graders to mitigate this risk. A novel visualization technique is presented demonstrating the acquired classifier knowledge on a classified screenshot.


military communications conference | 2016

MART: Targeted attack detection on a compromised network

Jack W. Stokes; Himanshu Chandola; Christian Seifert; Tim Burrell

Targeted attacks are a significant problem for governmental agencies and corporations. We propose a MinHash-based, targeted attack detection system which analyzes aggregated process creation events typically generated by human keyboard input. We start with a set of malicious process creation events, and their parameters, which are typically generated by an attacker remotely controlling computers on a network. The MinHash algorithm allows the system to efficiently process hundreds of millions of events each day. We propose the weighted squared match similarity score for targeted attack detection which is more robust to mimicry and NOOP attacks than the weighted Jaccard index. We demonstrate that the system can detect several confirmed targeted attacks on both a small dataset of 1,473 computers as well as a large network of over 230 thousand computers. In the first case, the proposed system detects a similar, but separate attack while in the latter, intrusion activity is detected at large-scale.


usenix security symposium | 2011

ZOZZLE: fast and precise in-browser JavaScript malware detection

Charlie Curtsinger; Benjamin Livshits; Benjamin G. Zorn; Christian Seifert


Archive | 2010

Zozzle: Low-overhead Mostly Static JavaScript Malware Detection

Charles Curtsinger Benjamin Livshits; Benjamin G. Zorn; Christian Seifert


usenix conference on large scale exploits and emergent threats | 2010

WebCop: locating neighborhoods of malware on the web

Jack W. Stokes; Reid Andersen; Christian Seifert; Kumar Chellapilla


Archive | 2011

Detection of code-based malware

Benjamin G. Zorn; Benjamin Livshits; Charles M. Curtsinger; Christian Seifert


Archive | 2011

Execution of Multiple Execution Paths

Benjamin Livshits; Benjamin G. Zorn; Christian Seifert; Clemens Kolbitsch


Archive | 2015

Large Scale Malicious Process Detection

Himanshu Chandola; Jack W. Stokes; Gil Lapid Shafriri; Craig Wittenberg; Timothy William Burrell; Christian Seifert

Collaboration


Dive into the Christian Seifert's collaboration.

Researchain Logo
Decentralizing Knowledge