Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for dynamically detecting malicious webpage scripts

A technology for dynamic detection and malicious web pages, applied in computer security devices, special data processing applications, instruments, etc., can solve problems such as browser crashes, and achieve the effect of avoiding crashes, improving reliability and detection rate

Active Publication Date: 2012-08-01
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method and device for dynamically detecting malicious webpage scripts, so as to improve the reliability of identifying shellcode, and solve the defect that the browser process crashes in the existing identification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for dynamically detecting malicious webpage scripts
  • Method and device for dynamically detecting malicious webpage scripts
  • Method and device for dynamically detecting malicious webpage scripts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] figure 1 The flow chart of the method provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method may include the following steps:

[0068] Step 101: Preliminary hooking a function to a preset function for writing shellcode.

[0069] Usually, webpage scripts write shellcode through a series of script functions, so that controllable malicious data can be generated in memory for attack, that is, these functions used to write shellcode can generate binary data in a specified format in memory. These preset functions for writing shellcode may include, but are not limited to: the \u function for escaping in javascript-type scripts, the unescape function for string decoding, or string for returning a string represented by an ASCII value. at least one of the fromcharcode function, the unescape function of the vbscript type script, the string.fromcharcode function, or the chrw function for returning the character associated with the specified chara...

Embodiment 2

[0082] figure 2 Another method flow chart provided for Embodiment 2 of the present invention, such as figure 2 As shown, the method may include the following steps:

[0083] Step 201 is the same as step 101 in the first embodiment.

[0084] Step 202 is the same as step 102 in the first embodiment.

[0085] Step 203 is the same as step 103 in the first embodiment.

[0086] Similarly, step 203 is also an optional step in this embodiment.

[0087] Step 204 is the same as step 104 in Embodiment 1, but if no self-locating code is detected during the disassembly process, then step 205 is executed.

[0088] Step 205: Perform high-risk bytecode statistics on the binary data obtained in step 202. If the number of high-risk bytecodes exceeds the preset high-risk bytecode threshold, the shellcode is detected; otherwise, go to step 202 to detect the webpage The script continues parsing until parsing ends.

[0089] High-risk bytecode is a feature extracted from a large number of sh...

Embodiment 3

[0105] image 3 The structure diagram of the device provided for Embodiment 3 of the present invention, such as image 3 As shown, the device may include: a script analysis unit 301 and a disassembly detection unit 302 .

[0106] The script parsing unit 301 parses the script of the webpage to be detected. During the parsing process, if the binary data generated by the corresponding function in the memory is obtained through the pre-set function hook for writing the shellcode, the disassembly detection is triggered. Unit 302.

[0107] After being triggered, the disassembly detection unit 302 performs disassembly detection on the binary data, and if a self-locating code is detected during the disassembly process, it is determined that shellcode is detected.

[0108] Since a preparation operation needs to be performed before parsing the webpage script, the device may further include: the preparation operation unit 303 creates a new IE control process, and hooks a preset functio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for dynamically detecting malicious webpage scripts. The method includes: S1, analyzing webpage scripts to be detected, and during analysis, if acquiring binary data generated by a function in internal memory through a function hook preliminarily hooked to the preset function for compiling a shell code, executing step S2; and S2, subjecting the binary data to disassembling detection, and if detecting a self-locating code during disassembling detection, confirming detection of the shell code. By loading the webpage scripts for dynamic analysis and detecting in the process of dynamic analysis, the method has improved reliability and detection rate as compared with the manner of static analysis. The shell code can be detected before script vulnerability is triggered, so that the method avoids crash of browser process as compared with the manner of externally monitoring the browser process.

Description

【Technical field】 [0001] The invention relates to the technical field of computer security, in particular to a method and device for dynamically detecting malicious web page scripts. 【Background technique】 [0002] With the continuous development of computer technology, computer network has become the main tool for people to obtain information, followed by the continuous improvement of the demand for computer security technology. Computer viruses, Trojan horses, spyware, and malicious codes are the main security threats faced by computer networks in recent years. Among them, shellcode is malicious code that exploits specific vulnerabilities, and is generally sent as data to the server to cause overflow. [0003] Existing methods for detecting shellcode in web page scripts mainly include the following two methods: [0004] One, adopt the method of statically analyzing webpage characteristics, maintain a malicious webpage characteristic table in advance, match the webpage scr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F17/30G06F21/56
Inventor 黄正
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More