Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and browser for protecting webpage against malicious attack

A malicious attack, webpage technology, applied in the field of browsers, can solve problems such as webpage Trojan attacks

Inactive Publication Date: 2015-05-27
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a method, device and browser for protecting against malicious webpage attacks, so as to solve the problem that attackers use ROP technology to bypass DEP to carry out webpage Trojan horse attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and browser for protecting webpage against malicious attack
  • Method, device and browser for protecting webpage against malicious attack
  • Method, device and browser for protecting webpage against malicious attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0040] In order to solve the problem that attackers use ROP technology (return-oriented programming technology) to bypass DEP (Data Execution Protection) to carry out webpage Trojan horse attacks, the application first analyzes the process of using ROP technology to carry out malicious attacks, as follows.

[0041] As described in the prior art, DEP (Data Execution Protection) cannot completely and effectively protect the system security, and new attack methods are still emerging one after another. The attacker can modify the memory of the memory address where the malicious code shellcode is located through the ROP technology (Return Oriented Programming Technology) The page protection attribute enables d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method, a device and a browser for protecting a webpage against a malicious attack, which aim to solve the problem that an attacker performs the Trojan horse attack on the webpage through bypassing DEP (Data Execution Protection) by the ROP (Return Oriented Programming) technology. In the application, a memory page protection attribute of a memory address to be modified by a malicious code is pre-detected when an API (Application Programming Interface) of the memory page protection attribute is transferred in the process; and the original memory page protection attribute and the modified memory page protection attribute of the memory address are distinguished through a rule, and a malicious modifying behavior is baffled or warned once found out, so that the conditions that the memory address of a data page is modified into an executable authority and the malicious code is illegally executed can be avoided.

Description

technical field [0001] The present application relates to browser technology, in particular to a method, device and browser for protecting against malicious webpage attacks. Background technique [0002] Webpage Trojan horse attack is one of the most popular network attacks at present. Currently, webpage Trojan horses use a large number of buffer overflow vulnerabilities in browsers to change and control the execution process of programs through overflow vulnerabilities, and finally control the system to download and run Trojan horses. The process of a web page Trojan attack is generally as follows: the attacker manipulates the heap memory of the browser through javascript, writes the malicious code shellcode into the heap memory address of the browser, changes the execution process of the program through the buffer overflow vulnerability, and makes the browser heap memory The shellcode is executed. [0003] As browser-based malicious attacks become more and more common, va...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/56
Inventor 宋申雷刘起张聪
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products