×

Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process

  • US 8,205,257 B1
  • Filed: 07/28/2009
  • Issued: 06/19/2012
  • Est. Priority Date: 07/28/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for preventing threats originating from a non-process based component hosted by a trusted process, comprising:

  • monitoring, by a hardware processor, loading activity of the trusted process;

    altering, by the hardware processor, a trust level associated with the trusted process when an unverified component is loaded into the trusted process;

    upon altering the trust level of the trusted process, monitoring, by the hardware processor, events performed by the trusted process for a suspicious activity that comprises a portable executable (“

    PE”

    ) file modification, PE file deletion, or PE file creation;

    assigning a trust level on an image file to the unverified component based on a digital signature of the unverified component;

    calling, by an operating system, an application programming interface to trace code execution by the trusted process;

    tracing the code execution of the suspicious activity back to an address space belonging to the unverified component that originated the suspicious activity;

    determining whether security risk associated with the unverified component that originated the suspicious activity is above a predetermined threshold; and

    upon determining that the security risk associated with the unverified component that originated the suspicious activity is above the predetermined threshold, terminating, by the hardware processor, the trusted process and deleting the unverified component that originated the suspicious activity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×