×

Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis

  • US 7,373,519 B1
  • Filed: 04/09/2003
  • Issued: 05/13/2008
  • Est. Priority Date: 04/09/2003
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for distinguishing between a legitimate modification and a malicious modification of executable computer file, the method comprising the steps of:

  • prior to a modification of an executable file;

    a modification analysis manager identifying a specified number of blocks of a specified size of contiguous substantive content from a specified section of the executable file; and

    the modification analysis manager storing, for each identified block, a location of the block, and content-specific information concerning the block; and

    after the modification of the executable file;

    the modification analysis manager comparing, for each identified block, content at the location of the block after the modification of the executable file with content of the block prior to the modification of the executable file; and

    the modification analysis manager determining a status of the modification of the executable file responsive to a result of the comparison and, responsive to determining that greater than a specified threshold percentage of the blocks has been modified, determining that the modification of the executable file comprises a legitimate modification.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×