Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for protecting against webpage attacks

A technology of equipment and web pages, applied in the direction of platform integrity maintenance, etc., can solve the problem of dehooking malicious attacks of key API functions of HOOK hooks

Active Publication Date: 2015-12-16
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The main purpose of the present invention is to provide a method and device for protecting against webpage attacks, so as to solve the problem of malicious attacks aimed at unhooking key API functions of HOOK hooks in the prior art, wherein the method may include: changing the memory when calling Before the hooked function to be detected of the memory protection attribute of the address, obtain the first parameter and the second parameter of the hooked function to be detected, wherein, the hooked function to be detected is a function to be detected that completes the hook operation; detection and the described Whether the first attribute of the memory address page associated with the first parameter is a permission associated with execution, and detecting whether the second attribute of the memory address page associated with the second parameter is modified to be associated with writable and when the first attribute is a permission associated with executable and the second attribute is modified to be a permission associated with writable, warning or preventing execution of the hooked function to be detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting against webpage attacks
  • Method and device for protecting against webpage attacks
  • Method and device for protecting against webpage attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The embodiment of the present invention is that when the process calls the API function for changing the memory page protection attribute, the memory page attribute of the modified memory address is detected, and the original memory page protection attribute of the memory address page is discriminated through the rules. The modification behavior is to prevent and warn, to protect the HOOK hook function entry address from being modified by the memory protection attribute, and not to be maliciously tampered with. The technical solution of the present application mainly protects the memory protection attribute of the entry address of the HOOK hook function from being modified to be writable by monitoring the calling of the API function changing the memory attribute.

[0029] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying dra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and equipment used for preventing webpage attack. The method comprises the following steps of: before a linked function to be detected which changes the memory protection attribute of a memory address is invoked, obtaining a first parameter and a second parameter of the linked function to be detected, wherein the linked function to be detected is a linked function to be detected which finished a linking operation; detecting whether the first attribute of the memory address page relevant to the first parameter is an executable-relevant permission; detecting whether the second attribute of the memory address page relevant to the second parameter is revised into a writable-relevant permission; and when the first attribute is the executable-relevant permission and the second attribute is revised into the writable-relevant permission, warning or stopping the execution of the linked function to be detected.

Description

technical field [0001] The invention relates to computer network security technology, in particular to a method and equipment for protecting webpage attacks. Background technique [0002] Web page Trojan horse attack is one of the most popular network attacks at present. Currently, most web page Trojans are based on buffer overflow vulnerabilities in browsers. Attackers use overflow vulnerabilities to change and control the execution process of programs, and ultimately control the system to download and run Trojans. The process of webpage Trojan horse attack is generally that the attacker manipulates the heap memory of the browser through javascript, writes the malicious code shellcode into the heap memory address of the browser, and changes the execution process of the program through the buffer overflow vulnerability, so that the shellcode in the browser heap memory be implemented. [0003] As web Trojan attacks become more and more common, the security products of vario...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
Inventor 宋申雷刘起张聪
Owner BEIJING QIHOO TECH CO LTD