DETECTION OF CODE INJECTION ATTACKS
First Claim
Patent Images
1. A method for detecting foreign code injected into a computer system comprising a processor and memory, the processor being configured to execute instructions stored in the memory, the method comprising:
- detecting, on the computer system, an illegal instruction error;
recording the illegal instruction error;
determining whether a threshold condition is met; and
generating an alert if the threshold condition is met.
13 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting foreign code injected into a computer system including a processor and memory, the processor being configured to execute instructions stored in the memory, includes: detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met.
-
Citations
20 Claims
-
1. A method for detecting foreign code injected into a computer system comprising a processor and memory, the processor being configured to execute instructions stored in the memory, the method comprising:
-
detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system comprising a processor and memory storing program instructions, the computer system being configured to execute instructions stored in the memory, the computer system being configured to:
-
detect an illegal instruction error; record the illegal instruction error; determine whether a threshold condition is met; and generate an alert if the threshold condition is met. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable medium embodying program instructions for execution by a data processing apparatus, the program instructions adapting the processing apparatus for:
-
detecting, on the data processing apparatus, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met. - View Dependent Claims (20)
-
Specification