发明名称 Software protection mechanism
摘要 Techniques for detecting malware activity are described. In some examples, a method for monitoring executing software for malware may include monitoring behavior of software during execution. Based on comparison of the monitored behavior and corresponding expected behavior derived from analysis of the software, it may be determined that the monitored behavior deviates from the expected behavior in accordance with a predetermined trigger. An appropriate action may be initiated in response.
申请公布号 US9405899(B2) 申请公布日期 2016.08.02
申请号 US201213583706 申请日期 2012.06.06
申请人 Empire Technology Development LLC 发明人 Khesin Oscar
分类号 G06F21/00;G06F21/55;G06F21/56 主分类号 G06F21/00
代理机构 Dorsey & Whitney LLP 代理人 Dorsey & Whitney LLP
主权项 1. A method for monitoring executing software, the method comprising: prior to execution of the software, accessing data indicative of expected behavior of the software, the expected behavior determined based on analysis of the software, wherein accessing data indicative of expected behavior of the software includes generating a first binary program graph that corresponds to source code level or executable code level program flow of the software, wherein the first binary program graph includes data structures, connectors, and executable commands; and during execution of the software: monitoring behavior of the software and comparing the monitored behavior with the data indicative of the expected behavior of the software, wherein monitoring behavior of the software includes generating a second binary program graph that corresponds to source code level or executable code level program flow of the software during execution, wherein the second binary program graph includes data structures, connectors, and executable commands;determining whether the monitored behavior deviates from the expected behavior in accordance with a predetermined trigger, wherein determining whether the monitored behavior deviates from the expected behavior in accordance with the predetermined trigger comprises matching the second binary program graph of the software and associated data structures or values of the software with the first binary program graph of the software; andresponsive to a determination that the monitored behavior deviates from the expected behavior in accordance with the predetermined trigger, automatically initiating an action.
地址 Wilmington DE US
您可能感兴趣的专利