DocumentCode
1624523
Title
Filtering malicious routines in web browsers using dynamic binary instrumentation
Author
Min, Jae Won ; Jung, Sung Min ; Chung, Tai Myoung
Author_Institution
Dept. of Electr. & Comput. Eng., Sungkyunkwan Univ., Suwon, South Korea
fYear
2012
Firstpage
554
Lastpage
557
Abstract
Extension of web browser capability has introduced variety of security problems. Attackers exploit vulnerabilities found in internals of web browsers or plugins to compromise the system and execute arbitrary code. In this paper, we present a filtering method which blocks malicious routines from being executed. Filtering is done by keeping a blacklist of dangerous routines and arguments separately to compare with the routines being called by the web browser at runtime. To show the concept, we built a prototype by using dynamic binary instrumentation framework called Pin. Pin provides rich API that allows us to build a custom tool that inserts instrumentation codes in the program. Using this tool, we are able to block malicious instructions from being executed.
Keywords
online front-ends; security of data; Pin; arbitrary code; attackers; dynamic binary instrumentation framework; instrumentation codes; malicious routines filtering; plugins; web browsers; Browsers; Information filters; Instruments; Monitoring; Payloads; Rendering (computer graphics); Dynamic Binary Instrumentation; Sandbox; Security; Vulnerability; Web Browser;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2012 14th International Conference on
Conference_Location
PyeongChang
ISSN
1738-9445
Print_ISBN
978-1-4673-0150-3
Type
conf
Filename
6174729
Link To Document