首页> 外文会议>Detection of intrusions and malware, and vulnerability assessment >Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
【24h】

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

机译:保护浏览器免遭偷渡式下载:减轻堆喷射代码注入攻击

获取原文
获取原文并翻译 | 示例

摘要

Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and browser plug-ins to execute shellcode, and in consequence, gain control of a victim's computer. Compromised machines are then used to carry out various malicious activities, such as joining botnets, sending spam emails, or participating in distributed denial of service attacks.rnTo counter drive-by downloads, we propose a technique that relies on x86 instruction emulation to identify JavaScript string buffers that contain shellcode. Our detection is integrated into the browser, and performed before control is transfered to the shellcode, thus, effectively thwarting the attack. The solution maintains fair performance by avoiding unnecessary invocations of the emulator, while ensuring that every buffer with potential shellcode is checked. We have implemented a prototype of our system, and evaluated it over thousands of malicious and legitimate web sites. Our results demonstrate that the system performs accurate detection with no false positives.
机译:偷渡式下载攻击是当今传播恶意软件的最常见方法。这些攻击通常利用Web浏览器和浏览器插件中的内存损坏漏洞来执行Shellcode,从而获得对受害者计算机的控制权。然后,被破坏的计算机将用于执行各种恶意活动,例如加入僵尸网络,发送垃圾邮件或参与分布式拒绝服务攻击。rn为了应对偷渡式下载,我们提出了一种技术,该技术依靠x86指令仿真来识别JavaScript。包含shellcode的字符串缓冲区。我们的检测已集成到浏览器中,并在控制权转移到Shellcode之前执行,从而有效地阻止了攻击。该解决方案通过避免对模拟器的不必要调用来保持合理的性能,同时确保检查了具有潜在shellcode的每个缓冲区。我们已经实现了系统的原型,并在数千个恶意和合法网站上对其进行了评估。我们的结果表明,该系统执行准确的检测,没有误报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号