Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
First Claim
1. A computer implemented method for distinguishing between a legitimate modification and a malicious modification of executable computer file, the method comprising the steps of:
- prior to a modification of an executable file;
a modification analysis manager identifying a specified number of blocks of a specified size of contiguous substantive content from a specified section of the executable file; and
the modification analysis manager storing, for each identified block, a location of the block, and content-specific information concerning the block; and
after the modification of the executable file;
the modification analysis manager comparing, for each identified block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and
the modification analysis manager determining a status of the modification of the executable file responsive to a result of the comparison and, responsive to determining that greater than a specified threshold percentage of the blocks has been modified, determining that the modification of the executable file comprises a legitimate modification.
2 Assignments
0 Petitions
Accused Products
Abstract
Prior to a modification of an executable computer file (101), a modification analysis manager (111) stores (1101) content concerning a specified number of specified sized blocks (115) of a specified section of the executable file (101). After the modification of the executable file (101), the modification analysis manager (111) compares (1103), for each block (115), the content at the location of the block (115) after the modification of the executable file (101) with the content of the block (115) prior to the modification. The modification analysis manager (101) determines (1105) the status of the modification, responsive to a result of the comparison.
119 Citations
24 Claims
-
1. A computer implemented method for distinguishing between a legitimate modification and a malicious modification of executable computer file, the method comprising the steps of:
-
prior to a modification of an executable file; a modification analysis manager identifying a specified number of blocks of a specified size of contiguous substantive content from a specified section of the executable file; and the modification analysis manager storing, for each identified block, a location of the block, and content-specific information concerning the block; and after the modification of the executable file; the modification analysis manager comparing, for each identified block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and the modification analysis manager determining a status of the modification of the executable file responsive to a result of the comparison and, responsive to determining that greater than a specified threshold percentage of the blocks has been modified, determining that the modification of the executable file comprises a legitimate modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented method for distinguishing between a legitimate modification and a malicious modification of an executable computer file that comprises at least two data sections, by analyzing a first data section of the executable computer file, the method comprising the steps of:
- prior to a modification of the executable file;
a modification analysis manager storing content information concerning a specific number of blocks of a specified size of contiguous content from the first data section wherein the modification analysis manager stores content information concerning a first block of a specified size that starts at the beginning of the first data section, and stores the location of and content information concerning a second block of a specified size that terminates at the end of the first data section; and
after the modification of the executable file;
the modification analysis manager comparing, for each block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and
responsive to no block of the first data section having been modified, the modification analysis manager determining that the modification of the executable file comprises a malicious modification. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
- prior to a modification of the executable file;
-
19. A computer readable medium containing a computer program product for distinguishing between a legitimate modification and a malicious modification of a code section of an executable computer file, the computer program product comprising:
-
program code for identifying a specified number of blocks of a specified size of contiguous substantive content from a specified section of an executable file, prior to a modification of the executable file; program code for storing, for each identified block, a location of the block, and content-specific information concerning the block, prior to the modification of the executable file; program code for, after the modification of the executable file, comparing, for each identified block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and program code for determining a status of the modification of the executable file responsive to a result of the comparison, after the modification of the executable file and for, responsive to determining that greater than a specified threshold percentage of the blocks has been modified, determining that the modification of the executable file comprises a legitimate modification. - View Dependent Claims (20)
-
-
21. A computer readable medium containing a computer program product for distinguishing between a legitimate modification and a malicious modification of an executable computer file that comprises at least two data sections by analyzing a first data section of an executable computer file, the computer program product comprising:
- program code for storing content information concerning a specified number of blocks of a specified size of contiguous content from the first data section, and for storing content information concerning a first block of a specified size that starts at the beginning of the first data section, and for storing the location of and content information concerning a second block of a specified size that terminates at the end of the first data section, prior to a modification of an executable file;
program code for, after the modification of the executable file, comparing, for each block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and
program code for, responsive to no block of the first data section having been modified, the modification analysis manager determining that the modification of the executable file comprises a malicious modification. - View Dependent Claims (22)
- program code for storing content information concerning a specified number of blocks of a specified size of contiguous content from the first data section, and for storing content information concerning a first block of a specified size that starts at the beginning of the first data section, and for storing the location of and content information concerning a second block of a specified size that terminates at the end of the first data section, prior to a modification of an executable file;
-
23. A computer system for distinguishing between a legitimate modification and a malicious modification of an executable computer file that comprises at least two data sections by analyzing a first data section of the executable computer file, the computer system comprising:
- a storage module storing content information concerning a specified number of blocks of a specified size of contiguous content from the data section wherein the storage module stores content information concerning a first block of a specified size that starts at the beginning of the first data section, and stores the location of and content information concerning a second block of a specified size that terminates at the end of the first data section, prior to a modification of an executable file;
a comparison module comparing, for each block, after the modification of the executable file, content at the location of the block after the modification of the executable file, the comparison module being communicatively coupled to the storage module; and
a determination module determining that the modification of the executable file comprises a malicious modification, responsive to no block of the first data section having been modified, the determination module being communicatively coupled to the comparison module. - View Dependent Claims (24)
- a storage module storing content information concerning a specified number of blocks of a specified size of contiguous content from the data section wherein the storage module stores content information concerning a first block of a specified size that starts at the beginning of the first data section, and stores the location of and content information concerning a second block of a specified size that terminates at the end of the first data section, prior to a modification of an executable file;
Specification