首页> 外文期刊>IEICE Transactions on Communications >Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
【24h】

Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

机译:使用运行时执行检测恶意网页中的堆喷射代码注入攻击

获取原文
获取原文并翻译 | 示例
       

摘要

The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
机译:Web服务的使用日益广泛,Web浏览器的攻击呈指数级增长。由于成功率很高,大多数攻击都使用称为堆喷的技术。堆喷涂会执行恶意代码,而不会通过将其复制到许多堆对象中来指示代码的确切地址。因此,如果仅利用此漏洞,则攻击很有可能成功。因此,攻击者最近开始使用此技术,因为很容易使用JavaScript来分配堆内存区域。本文提出了一种新颖的技术,该技术可通过在实际环境中执行堆对象来检测堆喷射攻击,而与Web浏览器的版本和修补程序状态无关。此运行时执行用于检测各种形式的堆喷射攻击,例如编码和多态性。堆对象根据堆喷射攻击的模式进行过滤后执行,以减少运行时执行的开销。堆喷射攻击的模式基于对Web浏览器如何访问良性网站的分析。堆对象在装入内存后,通过将指令寄存器更改为它们的地址来强制执行。因此,我们可以执行恶意代码,而不必考虑浏览器的版本和补丁状态。如果执行到达调用指令,然后该指令访问系统库的API,例如kernel32.dll和ws_32.dll,则该对象被视为包含恶意代码。为了更改寄存器并监视执行流,我们使用了调试器引擎。实现并评估了一个名为HERAD(堆喷射检测器)的原型。在实验中,HERAD检测到仿真无法检测到的各种形式的利用代码,以及NOZZLE无法检测到的一些堆喷射攻击。尽管它具有执行开销,但是HERAD产生的误报数量很少。几分钟的处理时间可以忽略不计,因为我们的研究重点是检测堆喷。这项研究可以应用于收集恶意代码的现有系统,例如Honeypot。

著录项

  • 来源
    《IEICE Transactions on Communications》 |2012年第5期|p.1711-1721|共11页
  • 作者单位

    Attached Institute of Electronics and Telecommunications Research Institute (ETRI), P.O. Box 1, Yuseong Post Office, Daejeon, 305-600, Republic of Korea;

    Attached Institute of Electronics and Telecommunications Research Institute (ETRI), P.O. Box 1, Yuseong Post Office, Daejeon, 305-600, Republic of Korea;

    Graduate School of Information and Security, Korea University, Anam-dong, Sungbuk-ku, Seoul, 136-701, Republic of Korea;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    malware detection; heap spraying attack;

    机译:恶意软件检测;堆喷攻击;
  • 入库时间 2022-08-18 00:25:24

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号