作者: Boxuan Gu , Wenbin Zhang , Xiaole Bai , Adam C. Champion , Feng Qin
DOI: 10.1007/978-3-642-36883-7_8
关键词:
摘要: JavaScript (JS) based shellcode injections are among the most dangerous attacks to computer systems. Existing approaches have various limitations in detecting such attacks. In this paper, we propose a new detection methodology that overcomes these by fully using JS code execution environment information. We leverage information and create virtual where shellcodes’ real behavior can be precisely monitored redundancy reduced. Following methodology, implement JSGuard, prototype malicious system Debian Linux with kernel version 2.6.26. Our extensive experiments show JSGuard reports very few false positives negatives acceptable overhead.