2009
DOI: 10.1007/978-3-642-02918-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

Abstract: Abstract. Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and browser plug-ins to execute shellcode, and in consequence, gain control of a victim's computer. Compromised machines are then used to carry out various malicious activities, such as joining botnets, sending spam emails, or participating in distributed denial of service attacks. To counter drive-by downloads, we propose a techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
96
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 118 publications
(97 citation statements)
references
References 12 publications
0
96
0
1
Order By: Relevance
“…Polychronakis et al [23] proposed to execute shellcode in a CPU emulator and detect suspicious memory accesses using four heuristics. Egele et al [24] presented a similar method which identifies potential shellcode at runtime and tests it in libemu [25]. Compared with these methods, we use different and more robust runtime features, which characterize the essential operations required in the infection process.…”
Section: Related Workmentioning
confidence: 99%
“…Polychronakis et al [23] proposed to execute shellcode in a CPU emulator and detect suspicious memory accesses using four heuristics. Egele et al [24] presented a similar method which identifies potential shellcode at runtime and tests it in libemu [25]. Compared with these methods, we use different and more robust runtime features, which characterize the essential operations required in the infection process.…”
Section: Related Workmentioning
confidence: 99%
“…A representive work is [18] that uses libemu [28] to detect shellcode in JS strings. The state of the art of dynamic analysis is network-level emulation, which decodes input data into instruction sequences and then emulates their execution [28, [37][38][39].…”
Section: Background: Detecting Shellcode In Js Objectsmentioning
confidence: 99%
“…1(a) can also be used to evade detection by current dynamic analysis based tools [18,28,[37][38][39]. Given an input stream containing the shellcode shown in Fig.…”
Section: Example 1: Thwarting Content Analysis Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, since bots cannot find new victims automatically, malware writers should employ other techniques. They install a malicious binary into compromised web sites and trick people into downloading it (i.e., drive-by-download [12]) or they ask other malware owners, who have pre-installed malware, to distribute their malware (i.e., pay-perinstallation (PPI) [17] [28]). This approach seems to be relatively passive because the operation sequence of this approach may depend on human actions or other tools.…”
Section: Introductionmentioning
confidence: 99%