Invention Grant
- Patent Title: Methods of identifying heap spray attacks using memory anomaly detection
-
Application No.: US15258993Application Date: 2016-09-07
-
Publication No.: US10430586B1Publication Date: 2019-10-01
- Inventor: Sushant Paithane , Sai Omkar Vashisht
- Applicant: FireEye, Inc.
- Applicant Address: US CA Milpitas
- Assignee: FireEye, Inc.
- Current Assignee: FireEye, Inc.
- Current Assignee Address: US CA Milpitas
- Agency: Rutan & Tucker, LLP
- Main IPC: G06F21/56
- IPC: G06F21/56 ; G06F3/06 ; H04L29/06

Abstract:
A non-transitory storage medium including instructions that are executable by one or more processors to perform operations including instrumenting a VM is shown. The VM is used to process an object to determine whether the object is associated with malware. Logic within the VM analyzes memory allocated for a process within the VM for a point of interest (POI), the POI being an address of one of a set predetermined instructions likely to be associated with malware. The VMM detects a memory violation during processing of the object and responsive to detecting the memory violation, injects a transition event at the POI on the page on which the POI is located in memory. Further, responsive to detecting an attempted execution of the transition event, the VMM (i) emulates an instruction located at the POI, and (ii) the logic within the VM performs one or more malware detection routines.
Information query