Malicious code protection for computer systems based on process modification

Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a protected process are modified upon loading by injecting a runtime protector that creates a copy of each of the process' imported libraries and...

Full description

Saved in:
Bibliographic Details
Main Authors Mimran, David, Gorelik, Michael, Guri, Mordechai, Kedma, Gabriel, Yehoshua, Ronen
Format Patent
LanguageEnglish
Published 07.01.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a protected process are modified upon loading by injecting a runtime protector that creates a copy of each of the process' imported libraries and maps the copy into a random address inside the process' address space to form a "randomized" shadow library. The libraries loaded at the original address are modified into a stub library. Shadow and stub libraries are also created for libraries that are loaded after the process creation is finalized. Consequently, when malicious code attempts to retrieve the address of a given procedure, it receives the address of the stub procedure, thereby neutralizing the malicious code. When the original program's code (e.g., the non-malicious code) attempts to retrieve the address of a procedure, it receives the correct address of the requested procedure (located in the shadow library).
Bibliography:Application Number: US201515324656