摘要 |
A system for disrupting malware includes a transform function and its inverse transform function which, when applied serially to an original bit pattern will return the original bit pattern, but when applied in solo will result in a bit pattern which is different than the original bit pattern, a preprocessor configured to apply the transform function in order to transform each benign program received from the computer-readable medium from an architecturally standardized form into a locally-specific form prior to storage of the program code in the program memory; a postprocessor configured to apply the inverse transform function in order to inversely transform all programs prior to their execution, such that previously transformed benign programs are converted back to the architecturally standardized form and malicious programs are rendered dysfunctional for their intended purpose. A method includes operations for serially transforming and inversely transforming authorized programs, but only inversely transforming unauthorized programs.
|