×

Preventing the successful exploitation of software application vulnerability for malicious purposes

  • US 9,754,105 B1
  • Filed: 09/24/2013
  • Issued: 09/05/2017
  • Est. Priority Date: 09/25/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying malicious behavior of a protected process of a protected application, the method comprising:

  • storing a plurality of application profiles, each of the plurality of application profiles associated with a different group of related applications of a particular application type, each of the plurality of application profiles including a different list of application programming interface (API) calls;

    detecting an API call originating from the protected process;

    determining an application profile applicable to the protected application based on an application type of the protected application;

    comparing the API call against a list of API calls included in the application profile corresponding to the protected application;

    determining to intercept the API call based on its presence in the list of API calls included in the application profile; and

    responsive to determining to intercept the API call;

    capturing a memory address associated with the API call and one or more parameters associated with the API call;

    applying, by a computing system, a memory analysis to determine if the memory address associated with the API call lacks execute access;

    applying, by the computing system, an element analysis to determine if a malicious characteristic associated with the API call is present based on the one or more parameters associated with the API call; and

    responsive to detecting that the memory address associated with the API call lacks execute access or determining that the malicious characteristic associated with the API call is present, terminating the protected process.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×