×

Methods and apparatus providing recovery from computer and network security attacks

  • US 7,607,041 B2
  • Filed: 05/01/2006
  • Issued: 10/20/2009
  • Est. Priority Date: 12/16/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • creating a secondary stack containing execution information of at least one function operating on a computer system by inserting a notifying identifier in the at least one function, where the notifying identifier provides execution information associated with the at least one function to the secondary stack;

    receiving execution information from the notifying identifier that the at least one function has begun execution at an entry point in the at least one function, where receiving execution information comprises capturing the execution information from the at least one function and storing the execution information from the at least one function, where the execution information includes a state of at least one register associated with the computer system, a hash of a current state of a primary stack, or a return address associated with the at least one function providing thenotifying identifier;

    and, after the secondary stack has been created;

    receiving an attack notification of an attack on the computer system;

    determining a safe recovery point in the secondary stack at which a recovery from the attack is possible; and

    recovering an exploited process using information located at the safe recovery point in the secondary stack.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×