Method, device and browser for protecting webpage against malicious attack

A malicious attack, webpage technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as webpage Trojan horse attacks

Inactive Publication Date: 2012-12-19
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a method, device and browser for protecting against malicious webpage attacks, so as to solve the problem that attackers use ROP technology to bypass DEP to carry out webpage Trojan horse attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and browser for protecting webpage against malicious attack
  • Method, device and browser for protecting webpage against malicious attack
  • Method, device and browser for protecting webpage against malicious attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the above objects, features and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0040] In order to solve the problem that attackers use ROP technology (return-oriented programming technology) to bypass DEP (Data Execution Prevention) to conduct web Trojan horse attacks, the present application first analyzes the process of using ROP technology to conduct malicious attacks, as follows.

[0041] As described in the prior art, DEP (Data Execution Prevention) cannot completely protect system security effectively, and new attack methods are still emerging one after another. Attackers can modify the memory of the memory address where the malicious code shellcode is located by using the ROP technology (return-oriented programming technology). The page protection attribute enables data memory pages to be execute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a method, a device and a browser for protecting a webpage against a malicious attack, which aim to solve the problem that an attacker performs the Trojan horse attack on the webpage through bypassing DEP (Data Execution Protection) by the ROP (Return Oriented Programming) technology. In the application, a memory page protection attribute of a memory address to be modified by a malicious code is pre-detected when an API (Application Programming Interface) of the memory page protection attribute is transferred in the process; and the original memory page protection attribute and the modified memory page protection attribute of the memory address are distinguished through a rule, and a malicious modifying behavior is baffled or warned once found out, so that the conditions that the memory address of a data page is modified into an executable authority and the malicious code is illegally executed can be avoided.

Description

technical field [0001] The present application relates to browser technology, and in particular, to a method, device and browser for protecting against malicious attacks on web pages. Background technique [0002] Web Trojan attack is one of the most popular network attacks at present. At present, Web Trojan uses a large number of browser buffer overflow vulnerabilities. Through the overflow vulnerability, it changes and controls the execution process of the program, and finally controls the system to download and run the Trojan. The process of web Trojan attack is generally as follows: the attacker manipulates the browser's heap memory through javascript, writes the malicious code shellcode into the browser's heap memory address, and changes the execution flow of the program through the buffer overflow vulnerability, making the browser's heap memory. The shellcode is executed. [0003] As browser-based malicious attacks become more and more common, various browsers have al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 宋申雷刘起张聪
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products