Please download the dossier by clicking on the dossier button x
×

Detection of malicious modules injected on legitimate processes

  • US 8,572,739 B1
  • Filed: 10/27/2009
  • Issued: 10/29/2013
  • Est. Priority Date: 10/27/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of detecting a malicious module in a computer, the method comprising:

  • the computer enumerating a first set of dynamic link libraries (DLLs) needed by a process running in the computer to operate, enumerating a second set of DLLs needed by a DLL in the first set of DLLs to operate, and enumerating a third set of DLLs needed by another DLL in the second set of DLLs to operate, the first, second, and third sets of DLLs being enumerated while the process is already running in the computer;

    the computer enumerating a fourth set of DLLs, the fourth set of DLLs comprising DLLs of the process and of other processes that are currently loaded in a main memory of the computer;

    the computer identifying a first DLL that is in the fourth set of DLLs but not in any of the first, second, and third sets of DLLs; and

    the computer deeming the first DLL as malicious when the first DLL does not include a function that the first DLL exports to be callable by another DLL or process running in the computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×