2012 IEEE Symposium on Security and Privacy EVILSEED: A Guided Approach to Finding Malicious Web Pages Luca Invernizzi Paolo Milani Comparetti UC Santa Barbara Lastline, Inc. and Vienna Univ. of Technology
[email protected] [email protected] Stefano Benvenuti Christopher Kruegel University of Genova UC Santa Barbara
[email protected] [email protected] Marco Cova Giovanni Vigna Lastline, Inc. and University of Birmingham UC Santa Barbara
[email protected] [email protected] Abstract—Malicious web pages that use drive-by download In addition to drive-by-download exploits, cybercriminals attacks or social engineering techniques to install unwanted also use social engineering to trick victims into installing or software on a user’s computer have become the main avenue running untrusted software. As an example, consider a web for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect page that asks users to install a fake video player that is URLs that are live on the Internet. Then, fast prefiltering presumably necessary to show a video (when, in fact, it is a techniques are employed to reduce the amount of pages that malware binary). Another example is fake anti-virus programs. need to be examined by more precise, but slower, analysis These programs are spread by web pages that scare users into tools (such as honeyclients). While effective, these techniques thinking that their machine is infected with malware, enticing require a substantial amount of resources. A key reason is that the crawler encounters many pages on the web that are benign, them to download and execute an actual piece of malware as that is, the “toxicity” of the stream of URLs being analyzed is a remedy to the claimed infection- [4], [5].