MiGuard: Detecting and Guarding against Malicious Iframe through API Hooking

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 396
  • Download : 7
Recently, client-side attacks through the Microsoft Internet Explorer have increased. In this paper, we present a method to detect and block malware programs resulting from successful malicious iframe attacks. This method can detect malware program execution through distinguishing API sequences of normal execution and abnormal API sequences resulting from an exploit using Win32 API hooks. We implemented MiGuard (Guard against malicious iframes) and performed experiments. The evaluation results indicate that our approach can effectively detect and block malicious iframes. We also believe that our research can help prevent threats of malicious iframes.
Publisher
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
Issue Date
2011-04
Language
English
Article Type
Article
Citation

IEICE ELECTRONICS EXPRESS, v.8, no.7, pp.460 - 465

ISSN
1349-2543
DOI
10.1587/elex.8.460
URI
http://hdl.handle.net/10203/96681
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0