The aim is to conduct research in order to study the options for intercepting suspicious functions in modern browsers and to create software that not only logs these functions but also modifies their settings on the fly in an environment convenient for the analyst (the workflow of the software described above is shown in Figure 1).
The researchers are provided with several obfuscated web documents and a table of functions for logging/modifying parameters.
The data is available after registration.
To analyze the methods for intercepting suspicious functions, to evaluate their positive and negative sides and to implement the most promising and convenient method for Microsoft Edge and Chrome browsers. The latest versions of the browsers, with the standard set of plugins, are expected to be used for testing.
The following criteria will be used to evaluate the solutions: