Filtering malicious routines in web browsers using dynamic binary instrumentation

作者: Tai Myoung Chung , Sung Min Jung , Jae Won Min

DOI:

关键词:

摘要: Extension of web browser capability has introduced variety security problems. Attackers exploit vulnerabilities found in internals browsers or plugins to compromise the system and execute arbitrary code. In this paper, we present a filtering method which blocks malicious routines from being executed. Filtering is done by keeping blacklist dangerous arguments separately compare with called at runtime. To show concept, built prototype using dynamic binary instrumentation framework Pin. Pin provides rich API that allows us build custom tool inserts codes program. Using tool, are able block instructions

参考文章(6)
Martin Bauer, Mathieu Boussard, Nicola Bui, Jourik De Loof, Carsten Magerkurth, Stefan Meissner, Andreas Nettsträter, Julinda Stefa, Matthias Thoma, Joachim W. Walewski, IoT Reference Architecture Springer, Berlin, Heidelberg. pp. 163- 211 ,(2013) , 10.1007/978-3-642-40403-0_8
Michalis Polychronakis, Angelos D. Keromytis, ROP payload detection using speculative code execution international conference on malicious and unwanted software. pp. 58- 65 ,(2011) , 10.1109/MALWARE.2011.6112327
Manuel Egele, Engin Kirda, Christopher Kruegel, Mitigating Drive-By Download Attacks: Challenges and Open Problems iNetSec 2009 – Open Research Problems in Network Security. ,vol. 309, pp. 52- 62 ,(2009) , 10.1007/978-3-642-05437-2_5
Saman P. Amarasinghe, Vladimir Kiriansky, Derek Bruening, Secure Execution via Program Shepherding usenix security symposium. pp. 191- 206 ,(2002)
A. Grosskurth, M.W. Godfrey, A reference architecture for Web browsers international conference on software maintenance. pp. 661- 664 ,(2005) , 10.1109/ICSM.2005.13