ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES
Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is de...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Singh, Abhishek Kumar Aaron, Freddie L Loveless, Peter A Joshi, Aditya Morenz, Tino |
description | Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019005236A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019005236A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019005236A13</originalsourceid><addsrcrecordid>eNrjZIhwdHZ29XENcgxxdVFw9ndxVfD083J1DvH091NwcQ2BskKDPf3cFfwDQOpArODI4BBXX6B6v5Agfx8foFZfV1__oEgFx5CQIE-n0BDXYB4G1rTEnOJUXijNzaDs5hri7KGbWpAfn1pckJicmpdaEh8abGRgaGlgYGpkbOZoaEycKgDk4zKf</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><source>esp@cenet</source><creator>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</creator><creatorcontrib>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</creatorcontrib><description>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190103&DB=EPODOC&CC=US&NR=2019005236A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25569,76552</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190103&DB=EPODOC&CC=US&NR=2019005236A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Singh, Abhishek Kumar</creatorcontrib><creatorcontrib>Aaron, Freddie L</creatorcontrib><creatorcontrib>Loveless, Peter A</creatorcontrib><creatorcontrib>Joshi, Aditya</creatorcontrib><creatorcontrib>Morenz, Tino</creatorcontrib><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><description>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIhwdHZ29XENcgxxdVFw9ndxVfD083J1DvH091NwcQ2BskKDPf3cFfwDQOpArODI4BBXX6B6v5Agfx8foFZfV1__oEgFx5CQIE-n0BDXYB4G1rTEnOJUXijNzaDs5hri7KGbWpAfn1pckJicmpdaEh8abGRgaGlgYGpkbOZoaEycKgDk4zKf</recordid><startdate>20190103</startdate><enddate>20190103</enddate><creator>Singh, Abhishek Kumar</creator><creator>Aaron, Freddie L</creator><creator>Loveless, Peter A</creator><creator>Joshi, Aditya</creator><creator>Morenz, Tino</creator><scope>EVB</scope></search><sort><creationdate>20190103</creationdate><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><author>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019005236A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Singh, Abhishek Kumar</creatorcontrib><creatorcontrib>Aaron, Freddie L</creatorcontrib><creatorcontrib>Loveless, Peter A</creatorcontrib><creatorcontrib>Joshi, Aditya</creatorcontrib><creatorcontrib>Morenz, Tino</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Singh, Abhishek Kumar</au><au>Aaron, Freddie L</au><au>Loveless, Peter A</au><au>Joshi, Aditya</au><au>Morenz, Tino</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><date>2019-01-03</date><risdate>2019</risdate><abstract>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2019005236A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T01%3A39%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Singh,%20Abhishek%20Kumar&rft.date=2019-01-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019005236A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |