{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233360","sets":["581:11492:11495"]},"path":["11495"],"owner":"44499","recid":"233360","title":["JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-15"},"_buckets":{"deposit":"b5455fa0-c059-4b74-b22b-1f5e5273e898"},"_deposit":{"id":"233360","pid":{"type":"depid","value":"233360","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection","author_link":["633684","633680","633682","633679","633678","633683","633685","633681"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection"},{"subitem_title":"JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:若手研究者] malicious website detection, WebAssembly, JavaScript, dataset generation","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2024-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University/National Institute of Technology"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University / National Institute of Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233360/files/IPSJ-JNL6503007.pdf","label":"IPSJ-JNL6503007.pdf"},"date":[{"dateType":"Available","dateValue":"2026-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6503007.pdf","filesize":[{"value":"2.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"26177d1c-4bd9-4125-b2af-7a73d3584862","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Chika, Komiya"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoto, Yanai"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kyosuke, Yamashita"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shingo, Okamura"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Chika, Komiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoto, Yanai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kyosuke, Yamashita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shingo, Okamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Machine learning is often used for malicious website detection, but an approach incorporating WebAssembly as a feature has not been explored due to a limited number of samples, to the best of our knowledge. In this paper, we propose JABBERWOCK (JAvascript-Based Binary EncodeR by WebAssembly Optimization paCKer), a tool to generate WebAssembly datasets in a pseudo fashion via JavaScript. Loosely speaking, JABBERWOCK automatically gathers JavaScript code in the real world, converts them into WebAssembly, and then outputs vectors of the WebAssembly as samples for malicious website detection. We experimentally evaluate JABBERWOCK from three perspectives. First, we measure its processing time. Second, we compare the samples generated by JABBERWOCK with the actual WebAssembly gathered from the Internet. Third, we investigate if JABBERWOCK can be used in malicious website detection. Regarding the processing time, we show that JABBERWOCK can construct a dataset in 4.5 seconds per sample for any number of samples. Next, comparing 10,000 samples output by JABBERWOCK with 168 gathered WebAssembly samples, we believe that the generated samples by JABBERWOCK are similar to those in the real world. We then show that JABBERWOCK can provide malicious website detection with 99% F1-score because JABBERWOCK makes a gap between benign and malicious samples as the reason for the above high score. We also confirm that JABBERWOCK can be combined with an existing malicious website detection tool to improve F1-scores. JABBERWOCK is publicly available via GitHub (https://github.com/c-chocolate/Jabberwock). \n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.298\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Machine learning is often used for malicious website detection, but an approach incorporating WebAssembly as a feature has not been explored due to a limited number of samples, to the best of our knowledge. In this paper, we propose JABBERWOCK (JAvascript-Based Binary EncodeR by WebAssembly Optimization paCKer), a tool to generate WebAssembly datasets in a pseudo fashion via JavaScript. Loosely speaking, JABBERWOCK automatically gathers JavaScript code in the real world, converts them into WebAssembly, and then outputs vectors of the WebAssembly as samples for malicious website detection. We experimentally evaluate JABBERWOCK from three perspectives. First, we measure its processing time. Second, we compare the samples generated by JABBERWOCK with the actual WebAssembly gathered from the Internet. Third, we investigate if JABBERWOCK can be used in malicious website detection. Regarding the processing time, we show that JABBERWOCK can construct a dataset in 4.5 seconds per sample for any number of samples. Next, comparing 10,000 samples output by JABBERWOCK with 168 gathered WebAssembly samples, we believe that the generated samples by JABBERWOCK are similar to those in the real world. We then show that JABBERWOCK can provide malicious website detection with 99% F1-score because JABBERWOCK makes a gap between benign and malicious samples as the reason for the above high score. We also confirm that JABBERWOCK can be combined with an existing malicious website detection tool to improve F1-scores. JABBERWOCK is publicly available via GitHub (https://github.com/c-chocolate/Jabberwock). \n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.298\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"65"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:34:45.335257+00:00","updated":"2025-01-19T10:07:22.002951+00:00","id":233360}