June 12, 2023, 1:10 a.m. | Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura

cs.CR updates on arXiv.org arxiv.org

Machine learning is often used for malicious website detection, but an
approach incorporating WebAssembly as a feature has not been explored due to a
limited number of samples, to the best of our knowledge. In this paper, we
propose JABBERWOCK (JAvascript-Based Binary EncodeR by WebAssembly Optimization
paCKer), a tool to generate WebAssembly datasets in a pseudo fashion via
JavaScript. Loosely speaking, JABBERWOCK automatically gathers JavaScript code
in the real world, convert them into WebAssembly, and then outputs vectors of
the …

application best of binary detection javascript knowledge machine machine learning malicious malicious website tool webassembly website

Security Engineer II, Engineering

@ Trail of Bits | Worldwide - Remote

Technical Support Engineer - Network Security

@ Ivanti | Bengaluru, India (Bagmane)

Senior Security Analyst- Container Threat and Vulnerability Management

@ Oracle | Philippines

Cybersecurity Strategy & Operations Officer (m/f/d)

@ Nordex Group | Madrid, ES, 28001

Security Administrator

@ ManTech | 201DT - 2251 Corp Park Dr, Herndon, VA

Cybersecurity Specialist

@ GFT Technologies | Sant Cugat del Vallès, B, ES, 08174