作者: Tai Myoung Chung , Sung Min Jung , Jae Won Min
DOI:
关键词:
摘要: Extension of web browser capability has introduced variety security problems. Attackers exploit vulnerabilities found in internals browsers or plugins to compromise the system and execute arbitrary code. In this paper, we present a filtering method which blocks malicious routines from being executed. Filtering is done by keeping blacklist dangerous arguments separately compare with called at runtime. To show concept, built prototype using dynamic binary instrumentation framework Pin. Pin provides rich API that allows us build custom tool inserts codes program. Using tool, are able block instructions