Observer effect: How intercepting HTTPS traffic forces malware to change their behavior

1Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has been a growing interest in understanding the usage of HTTPs by malware. This paper describes our research to obtain large quantities of real malware traffic using HTTPs, our use of man-in-the-middle HTTPs interceptor proxies to open and study the content, and our analysis of how the behavior of the malware changes after being intercepted. The research goal is to understand how malware uses HTTPs and the impact of intercepting its traffic. We conclude that the use of an interceptor proxy forces the malware to change its behavior and therefore should be carefully considered before being implemented.

Cite

CITATION STYLE

APA

Erquiaga, M. J., García, S., & Garino, C. G. (2018). Observer effect: How intercepting HTTPS traffic forces malware to change their behavior. In Communications in Computer and Information Science (Vol. 790, pp. 272–281). Springer Verlag. https://doi.org/10.1007/978-3-319-75214-3_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free