A new open-source tool called VisibleV8 allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs.
The tool runs in the Chrome browser and is designed to detect malicious programs that are capable of evading existing malware detection systems.
“When you go to most websites, your browser starts running the site’s JavaScript programs pretty much immediately—and you have little or no idea of what that JavaScript is doing,” says coauthor Alexandros Kapravelos, an assistant professor of computer science at North Carolina State University.
“We’ve created a stealthy tool for monitoring JavaScript in the wild.”
“Previous state-of-the-art malware detection systems rely on making changes to JavaScript code in order to see how the code is being executed. But this approach is easily detected, allowing malware programs to alter their behavior in order to avoid being identified as malicious,” he says.
“VisibleV8 runs in the browser itself, recording how JavaScript is executed; it doesn’t interact with the code and, as a result, is far more difficult to detect.”
VisibleV8 saves all of the data on how a site is using JavaScript, creating a “behavior profile” for the site. Researchers can then use that profile, and all of the supporting data, to identify both malicious websites and the various ways that JavaScript can compromise web browsers and user information.
Because VisibleV8 consists of only 600 lines of code, out of the millions of lines of code in Chrome, the software tool is relatively easy to keep up-to-date. This is an important consideration given that Google updates Chrome’s code approximately every six weeks. VisibleV8 can also target the most likely malicious behaviors without hurting browser performance.
“We’ve created a stealthy tool for monitoring JavaScript in the wild,” Kapravelos says. “We’re now making it open source, in hopes that it will be useful to anyone doing research on web privacy and security.”
You can download VisibleV8 from Kapravelos’ site.
The researchers will present their work at the ACM Internet Measurement Conference 2019, in Amsterdam, Netherlands.
Support for the work came from the Office of Naval Research; DARPA; and the National Science Foundation.
Source: NC State