×

Security monitor

  • US 5,974,549 A
  • Filed: 03/27/1997
  • Issued: 10/26/1999
  • Est. Priority Date: 03/27/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of creating a secure sandbox around both a monitored application and one or more software components associated therewith in accordance with a predetermined security policy, said method comprising the steps of:

  • intercepting a selected set of application programming interface (API) function calls issued by said monitored application by replacing the addresses of all API functions to be intercepted in an import data table associated with said monitored application with addresses of security monitor functions, each security monitor function associated with a different API function;

    intercepting API function calls issued by said software component by replacing the addresses of API functions to be intercepted in an import data table associated with said software component with addresses of sub functions, each stub function operative to call a security monitor function associated with a different API function;

    intercepting non-API function calls issued by said software component by replacing the addresses of non-API functions to be intercepted in an import data table associated with said software component with addresses of stub functions, each stub function operative to call a security monitor function associated with a different non-API function;

    creating a call chain operative to permit distinguishing between function calls made by said software component from function calls made by said monitored application;

    blocking intercepted API calls that are forbidden according to the security policy; and

    allowing intercepted API calls that are permitted according to the security policy.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×