SYSTEM AND METHOD FOR DETECTING MALWARE IN A STREAM OF BYTES
First Claim
Patent Images
1. A system comprising:
- a first unit configured to;
receive a stream of bytes,cause a second unit to execute the stream of bytes from a selected first offset, andmonitor an execution of the stream of bytes by the second unit; and
a second unit configured to;
execute the stream of bytes from the selected offset;
wherein the first unit is configured to determine, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method may include a first unit configured to receive a stream of bytes, cause a second unit to execute the stream of bytes from a selected first offset, and monitor an execution of the stream of bytes by the second unit. A second unit may be configured to execute the stream of bytes from the selected offset. The first unit may be configured to determine, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware.
3 Citations
21 Claims
-
1. A system comprising:
-
a first unit configured to; receive a stream of bytes, cause a second unit to execute the stream of bytes from a selected first offset, and monitor an execution of the stream of bytes by the second unit; and a second unit configured to; execute the stream of bytes from the selected offset; wherein the first unit is configured to determine, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 16)
-
-
11. A method comprising:
-
receiving a stream of bytes by a first unit; selecting a first offset; causing, by the first unit, a second unit to execute the stream of bytes from a selected first offset; monitoring, by the first unit, an execution of the stream of bytes by the second unit; and determining, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware. - View Dependent Claims (12, 13, 14, 15, 17, 18, 19, 20)
-
-
21. A method comprising:
-
selecting a first offset in a byte stream; causing a first unit to execute the byte stream from the selected first offset; monitoring, by a second unit, an execution of the byte stream; and determining, by the second unit and based on a result of the execution, whether or not the stream of bytes includes a malware.
-
Specification