SYSTEM AND METHOD FOR BELOW-OPERATING SYSTEM MODIFICATION OF MALICIOUS CODE ON AN ELECTRONIC DEVICE
First Claim
Patent Images
1. A method for securing an electronic device, comprising:
- detecting, at a level below all of the operating systems of the electronic device accessing a memory or a storage of the electronic device, presence of malicious code; and
in response to detecting the presence of malicious code, modifying, at a level below all of the operating systems of the electronic device accessing the memory or the storage of the electronic device, the malicious code.
10 Assignments
0 Petitions
Accused Products
Abstract
A system for securing an electronic device, may include a memory, a processor, one or more operating systems residing in the memory for execution by the processor; and a security agent configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the memory. The security agent may be further configured to detect presence of malicious code, and in response to detecting presence of the malicious code, modify the malicious code.
49 Citations
21 Claims
-
1. A method for securing an electronic device, comprising:
-
detecting, at a level below all of the operating systems of the electronic device accessing a memory or a storage of the electronic device, presence of malicious code; and in response to detecting the presence of malicious code, modifying, at a level below all of the operating systems of the electronic device accessing the memory or the storage of the electronic device, the malicious code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for securing an electronic device, comprising:
-
a memory; a processor; one or more operating systems residing in the memory for execution by the processor; a security agent configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the memory, and further configured to; detect presence of malicious code; and in response to detecting presence of the malicious code, modify the malicious code. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An article of manufacture, comprising:
-
a computer readable medium; computer-executable instructions carried on the computer readable medium, the instructions readable by a processor, the instructions, when read and executed, for causing the processor to, at a level below all of the operating systems of an electronic device accessing a memory or storage of the electronic device; detect presence of malicious code in the memory or storage of electronic device; and in response to detecting presence of the malicious code, modifying the malicious code. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification