×

Identifying malicious threads

  • US 9,135,443 B2
  • Filed: 05/06/2010
  • Issued: 09/15/2015
  • Est. Priority Date: 05/06/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method to terminate a malicious thread, the method executed by a data processing apparatus and comprising:

  • identifying, in computer memory, a memory heap assigned to a particular computer process, the memory heap comprising a plurality of memory heap blocks;

    determining that a particular one of the plurality of memory heap blocks is a malicious memory heap block added by a malicious source to the memory block assigned to the particular computer process;

    identifying that one or more threads have a start address that resides within the malicious memory heap block, the one or more threads comprising a subset of a plurality of threads;

    performing an analysis on each thread in the subset of threads based on each thread in the subset having a start address within the malicious memory heap block, to determine, for each of the threads in the subset, whether the thread is a malicious thread injected into the particular computer process by malware, the analysis comprising, for each of the threads in the subset, identifying a signature for the thread and comparing the signature for the thread to signatures of known malicious threads, the particular computer process comprising a non-malicious process, and at least one of the subset of threads is a non-malicious thread of the particular computer process; and

    terminating threads in the subset of threads determined through the analysis to be malicious, where the at least one non-malicious thread is preserved.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×