Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior

Autores
Erquiaga, María José; García, Sebastián; García Garino, Carlos
Año de publicación
2017
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has been a growing interest in understanding the usage of HTTPs by malware. This paper describes our research to obtain large quantities of real malware traffic using HTTPs, our use of man-in-the-middle HTTPs interceptor proxies to open and study the content, and our analysis of how the behavior of the malware changes after being intercepted. The research goal is to understand how malware uses HTTPs and the impact of intercepting its traffic. We conclude that the use of a interceptor proxy forces the malware to change its behavior and therefore should be carefully considered before being implemented.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
malware
botnets
network security
MITM
proxy
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/63935

id SEDICI_10662162fbe9e59768562e72bc9f80ca
oai_identifier_str oai:sedici.unlp.edu.ar:10915/63935
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Observer effect: How Intercepting HTTPS traffic forces malware to change their behaviorErquiaga, María JoséGarcía, SebastiánGarcía Garino, CarlosCiencias Informáticasmalwarebotnetsnetwork securityMITMproxyDuring the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has been a growing interest in understanding the usage of HTTPs by malware. This paper describes our research to obtain large quantities of real malware traffic using HTTPs, our use of man-in-the-middle HTTPs interceptor proxies to open and study the content, and our analysis of how the behavior of the malware changes after being intercepted. The research goal is to understand how malware uses HTTPs and the impact of intercepting its traffic. We conclude that the use of a interceptor proxy forces the malware to change its behavior and therefore should be carefully considered before being implemented.VI Workshop de Seguridad Informática (WSI).Red de Universidades con Carreras en Informática (RedUNCI)2017-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf1279-1288http://sedici.unlp.edu.ar/handle/10915/63935enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:08:34Zoai:sedici.unlp.edu.ar:10915/63935Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:08:34.715SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
title Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
spellingShingle Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
Erquiaga, María José
Ciencias Informáticas
malware
botnets
network security
MITM
proxy
title_short Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
title_full Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
title_fullStr Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
title_full_unstemmed Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
title_sort Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior
dc.creator.none.fl_str_mv Erquiaga, María José
García, Sebastián
García Garino, Carlos
author Erquiaga, María José
author_facet Erquiaga, María José
García, Sebastián
García Garino, Carlos
author_role author
author2 García, Sebastián
García Garino, Carlos
author2_role author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
malware
botnets
network security
MITM
proxy
topic Ciencias Informáticas
malware
botnets
network security
MITM
proxy
dc.description.none.fl_txt_mv During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has been a growing interest in understanding the usage of HTTPs by malware. This paper describes our research to obtain large quantities of real malware traffic using HTTPs, our use of man-in-the-middle HTTPs interceptor proxies to open and study the content, and our analysis of how the behavior of the malware changes after being intercepted. The research goal is to understand how malware uses HTTPs and the impact of intercepting its traffic. We conclude that the use of a interceptor proxy forces the malware to change its behavior and therefore should be carefully considered before being implemented.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
description During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has been a growing interest in understanding the usage of HTTPs by malware. This paper describes our research to obtain large quantities of real malware traffic using HTTPs, our use of man-in-the-middle HTTPs interceptor proxies to open and study the content, and our analysis of how the behavior of the malware changes after being intercepted. The research goal is to understand how malware uses HTTPs and the impact of intercepting its traffic. We conclude that the use of a interceptor proxy forces the malware to change its behavior and therefore should be carefully considered before being implemented.
publishDate 2017
dc.date.none.fl_str_mv 2017-10
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/63935
url http://sedici.unlp.edu.ar/handle/10915/63935
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
1279-1288
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844615958013935616
score 13.070432