Countering infections to communications modules
First Claim
1. A computer implemented method for countering malicious code infections that spread from a first computer to second computer, said method comprising the steps of:
- searching for a communications module within the first computer;
examining a function location directory within the communications module;
locating a send function within the function location directory;
declaring the presence of malicious code when the function location directory states that the send function is slated to start executing at a non-normal location; and
excising malicious code detected within the send function.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparati and computer readable media for countering malicious code infections that spread from a first computer to a second computer. A searching module (51) searches for a communications module (20) within the first computer (1(1)). An examining module (52) examines a function location directory (27) within the communications module (20). A locating module (53) locates a send function within the function location directory (27). A declaring module (54) declares the presence of malicious code when the function location directory (27) states that the send function is slated to start executing at a non-normal location.
120 Citations
23 Claims
-
1. A computer implemented method for countering malicious code infections that spread from a first computer to second computer, said method comprising the steps of:
-
searching for a communications module within the first computer; examining a function location directory within the communications module; locating a send function within the function location directory; declaring the presence of malicious code when the function location directory states that the send function is slated to start executing at a non-normal location; and excising malicious code detected within the send function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer implemented method for detecting corrupted code within a computer, said method comprising the steps of:
-
searching for a communications module within the computer; examining a function location directory within the communications module; locating a send function within the function location directory; declaring the presence of corrupted code when the function location directory states that the send function is slated to start executing at a location outside the communications module; and excising malicious code detected within the send function.
-
-
14. Apparatus for countering malicious code infections that spread from a first computer to a second computer, said apparatus comprising:
-
a module for searching for a communications module within the first computer; coupled to the searching module, a module for examining a function location directory within the communications module; coupled to the examining module, a module for locating a send function within the function location directory; coupled to the locating module, a module for declaring the presence of malicious code when the function location directory states that the send function is slated to start executing at non-normal location; and coupled to the declaring module, a module for excising malicious code detected within the send function. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computer-readable storage medium containing computer code for countering malicious code infections that spread from a first computer to a second computer, said computer code comprising instructions for performing the steps of:
-
searching for communications module within the first computer; examining a function location directory within the communications module; locating send function within the function location directory; declaring the presence of malicious code when the function location directory states that the send function is slated to start executing at a non-normal location; and excising malicious code detected within the send function. - View Dependent Claims (21, 22, 23)
-
Specification