×

Method to detect application execution hijacking using memory protection

  • US 10,210,329 B1
  • Filed: 09/30/2015
  • Issued: 02/19/2019
  • Est. Priority Date: 09/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. An electronic device, comprising:

  • one or more hardware processors; and

    a non-transitory computer-readable storage medium communicatively coupled to the one or more hardware processors, the non-transitory computer-readable storage medium having stored thereon logic that, upon execution by the one or more hardware processors, performs operations comprising;

    identifying a loaded module,applying a protection mechanism to an element of the loaded module so as to establish a protected region, wherein the element of the loaded module is one of a base address of the loaded module, an import table of the loaded module or a process environment block of the loaded module,determining whether an access source is attempting to access the protected region,determining whether the access source is from the heap, anddetermining the access source is malicious based on determining the access source is attempting to access the protected region and is from the heap.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×