Preventing drive-by download via inter-module communication monitoring

  • Authors:
  • Chengyu Song;Jianwei Zhuge;Xinhui Han;Zhiyuan Ye

  • Affiliations:
  • Peking University, China;Peking University, China;Peking University, China;Peking University, China

  • Venue:
  • ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Drive-by download attack is one of the most severe threats to Internet users. Typically, only visiting a malicious page will result in compromise of the client and infection of malware. By the end of 2008, drive-by download had already become the number one infection vector of malware [5]. The downloaded malware may steal the users' personal identification and password. They may also join botnet to send spams, host phishing site or launch distributed denial of service attacks. Generally, these attacks rely on successful exploits of the vulnerabilities in web browsers or their plug-ins. Therefore, we proposed an inter-module communication monitoring based technique to detect malicious exploitation of vulnerable components thus preventing the vulnerability being exploited. We have implemented a prototype system that was integrated into the most popular web browser Microsoft Internet Explorer. Experimental results demonstrate that, on our test set, by using vulnerability-based signature, our system could accurately detect all attacks targeting at vulnerabilities in our definitions and produced no false positive. The evaluation also shows the performance penalty is kept low.