ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES

Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is de...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Singh, Abhishek Kumar, Aaron, Freddie L, Loveless, Peter A, Joshi, Aditya, Morenz, Tino
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Singh, Abhishek Kumar
Aaron, Freddie L
Loveless, Peter A
Joshi, Aditya
Morenz, Tino
description Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019005236A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019005236A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019005236A13</originalsourceid><addsrcrecordid>eNrjZIhwdHZ29XENcgxxdVFw9ndxVfD083J1DvH091NwcQ2BskKDPf3cFfwDQOpArODI4BBXX6B6v5Agfx8foFZfV1__oEgFx5CQIE-n0BDXYB4G1rTEnOJUXijNzaDs5hri7KGbWpAfn1pckJicmpdaEh8abGRgaGlgYGpkbOZoaEycKgDk4zKf</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><source>esp@cenet</source><creator>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</creator><creatorcontrib>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</creatorcontrib><description>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190103&amp;DB=EPODOC&amp;CC=US&amp;NR=2019005236A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25569,76552</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190103&amp;DB=EPODOC&amp;CC=US&amp;NR=2019005236A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Singh, Abhishek Kumar</creatorcontrib><creatorcontrib>Aaron, Freddie L</creatorcontrib><creatorcontrib>Loveless, Peter A</creatorcontrib><creatorcontrib>Joshi, Aditya</creatorcontrib><creatorcontrib>Morenz, Tino</creatorcontrib><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><description>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIhwdHZ29XENcgxxdVFw9ndxVfD083J1DvH091NwcQ2BskKDPf3cFfwDQOpArODI4BBXX6B6v5Agfx8foFZfV1__oEgFx5CQIE-n0BDXYB4G1rTEnOJUXijNzaDs5hri7KGbWpAfn1pckJicmpdaEh8abGRgaGlgYGpkbOZoaEycKgDk4zKf</recordid><startdate>20190103</startdate><enddate>20190103</enddate><creator>Singh, Abhishek Kumar</creator><creator>Aaron, Freddie L</creator><creator>Loveless, Peter A</creator><creator>Joshi, Aditya</creator><creator>Morenz, Tino</creator><scope>EVB</scope></search><sort><creationdate>20190103</creationdate><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><author>Singh, Abhishek Kumar ; Aaron, Freddie L ; Loveless, Peter A ; Joshi, Aditya ; Morenz, Tino</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019005236A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Singh, Abhishek Kumar</creatorcontrib><creatorcontrib>Aaron, Freddie L</creatorcontrib><creatorcontrib>Loveless, Peter A</creatorcontrib><creatorcontrib>Joshi, Aditya</creatorcontrib><creatorcontrib>Morenz, Tino</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Singh, Abhishek Kumar</au><au>Aaron, Freddie L</au><au>Loveless, Peter A</au><au>Joshi, Aditya</au><au>Morenz, Tino</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES</title><date>2019-01-03</date><risdate>2019</risdate><abstract>Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019005236A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T01%3A39%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Singh,%20Abhishek%20Kumar&rft.date=2019-01-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019005236A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true