×

Exploit of privilege detection framework

  • US 10,565,378 B1
  • Filed: 06/29/2016
  • Issued: 02/18/2020
  • Est. Priority Date: 12/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory storage medium having stored thereon logic, the logic being executable by one or more processors to perform operations including:

  • responsive to detecting creation of a first process, adding data to a privilege list, the data including (i) identification information of the first process and (ii) an initial privilege of the first process, wherein the data added to the privilege list is set forth in a first token associated with the first process, and the first token being associated with the first process in a one-to-one mapping at a time the data is added to the privilege list;

    detecting performance of one or more operations and a modification of the first token that is associated with the first process, wherein the modification of the first token alters a current privilege of the first process to be greater than the initial privilege;

    responsive to detecting the performance of the one or more operations and the modification of the first token, comparing a current privilege of the first process with the initial privilege of the first process recorded in the privilege list;

    determining a change exists between the current privilege of the first process and the initial privilege of the first process that is greater than a predetermined threshold;

    responsive to determining the change exists between the current privilege of the first process and the initial privilege of the first process that is greater than the predetermined threshold, determining the first process is operating with the current privilege due to an exploit of privilege attack; and

    responsive to determining the first process is operating with the current privilege due to an exploit of privilege attack, generating an alert that the first process operating with the current privilege due to the exploit of privilege attack.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×