Scalable web object inspection and malfease collection

  • Authors:
  • Charalampos Andrianakis;Paul Seymer;Angelos Stavrou

  • Affiliations:
  • Center for Secure Information Systems, George Mason University, Fairfax, VA;Center for Secure Information Systems, George Mason University, Fairfax, VA;Center for Secure Information Systems, George Mason University, Fairfax, VA

  • Venue:
  • HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Internet drive-by downloads attacks are the preferred vehicle to infect desktop computers. In this paper, we propose a new URL analysis framework that combines lightweight virtualization and novel modifications to the WINE engine to detect heap spray attacks against applications. In addition, we are able to extract the attack shellcode used to further download other malicious binaries to the victim machine. Our preliminary results indicate that our system offers a compelling alternative to other process monitoring and virtualization technologies including QEMU and VMware since it can scale to thousands of instances per machine.