APPLICATION SANDBOXING USING A DYNAMIC OPTIMIZATION FRAMEWORK
First Claim
Patent Images
1. A method for preventing malware attacks, comprising:
- launching an application on an electronic device;
intercepting one or more instructions from the application, the application attempting to execute the one or more instructions;
determining whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device;
rewriting the one or more instructions to access the secured system resource of the electronic device;
executing the rewritten instructions on the electronic device; and
observing the results of the rewritten instructions.
10 Assignments
0 Petitions
Accused Products
Abstract
A method for preventing malware attacks includes, launching an application on an electronic device, intercepting one or more instructions from the application, determining whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device, rewriting the one or more instructions to access the secured system resource of the electronic device, executing the rewritten instructions on the electronic device, and observing the results of the rewritten instructions. The application is attempting to execute the one or more instructions.
-
Citations
31 Claims
-
1. A method for preventing malware attacks, comprising:
-
launching an application on an electronic device; intercepting one or more instructions from the application, the application attempting to execute the one or more instructions; determining whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device; rewriting the one or more instructions to access the secured system resource of the electronic device; executing the rewritten instructions on the electronic device; and observing the results of the rewritten instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An article of manufacture, comprising:
-
a computer readable medium; and computer-executable instructions carried on the computer readable medium, the instructions readable by a processor, the instructions, when read and executed, for causing the processor to; launch an application on an electronic device; intercept one or more instructions from the application, the application attempting to execute the one or more instructions; determine whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device; rewrite the one or more instructions to access a secured system resource of the electronic device; execute the rewritten instructions on the electronic device; and observe the results of the rewritten instructions. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for preventing malware attacks, comprising:
-
a processor coupled to a memory; and a dynamic optimization framework executed by the processor, resident within the memory, the framework configured to; launch an application on an electronic device; intercept one or more instructions from the application, the application attempting to execute the one or more instructions; determine whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device; rewrite the one or more instructions to access a secured system resource of the electronic device; execute the rewritten instructions on the electronic device; and observe the results of the rewritten instructions. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification