×

Detection of malicious system calls

  • US 8,561,198 B2
  • Filed: 05/07/2010
  • Issued: 10/15/2013
  • Est. Priority Date: 05/07/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a data processing apparatus, the method comprising:

  • monitoring a function vulnerable to a buffer overflow attack;

    receiving a call to the function, the call associated with a call stack, the call stack including one or more base pointers, and a destination buffer associated with the function;

    identifying a particular one of the one or more base pointers as pointing to a first memory address greater than an address of the destination buffer;

    determining that the first address is a critical memory address based at least in part on identifying that the first memory address is greater than the address of the destination buffer;

    performing a comparison of expected contents of a first memory location identified by the first address with observed contents of the first memory location following an execution of the function based on the received call, wherein the comparison is performed based at least in part on determining that the first memory address is a critical memory address; and

    determining whether the received call corresponds to a potential buffer overflow attack based at least in part on the comparison.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×