Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, YoungHan-
dc.contributor.authorKim, HyoungChun-
dc.contributor.authorLee, DongHoon-
dc.date.accessioned2021-09-06T20:23:13Z-
dc.date.available2021-09-06T20:23:13Z-
dc.date.created2021-06-18-
dc.date.issued2012-05-
dc.identifier.issn0916-8516-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/108547-
dc.description.abstractThe growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead. HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleDetecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, DongHoon-
dc.identifier.doi10.1587/transcom.E95.B.1711-
dc.identifier.scopusid2-s2.0-84860610020-
dc.identifier.wosid000304573000027-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON COMMUNICATIONS, v.E95B, no.5, pp.1711 - 1721-
dc.relation.isPartOfIEICE TRANSACTIONS ON COMMUNICATIONS-
dc.citation.titleIEICE TRANSACTIONS ON COMMUNICATIONS-
dc.citation.volumeE95B-
dc.citation.number5-
dc.citation.startPage1711-
dc.citation.endPage1721-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthormalware detection-
dc.subject.keywordAuthorheap spraying attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE