Invention Grant
- Patent Title: Malicious code protection for computer systems based on process modification
-
Application No.: US15324656Application Date: 2015-05-08
-
Publication No.: US10528735B2Publication Date: 2020-01-07
- Inventor: Michael Gorelik , Mordechai Guri , David Mimran , Gabriel Kedma , Ronen Yehoshua
- Applicant: MORPHISEC INFORMATION SECURITY 2014 LTD.
- Applicant Address: IL Beer Sheva
- Assignee: Morphisec Information Security 2014 Ltd.
- Current Assignee: Morphisec Information Security 2014 Ltd.
- Current Assignee Address: IL Beer Sheva
- Agency: Fiala & Weaver P.L.L.C.
- International Application: PCT/IB2015/053394 WO 20150508
- International Announcement: WO2016/079602 WO 20160526
- Main IPC: G06F21/56
- IPC: G06F21/56 ; G06F21/52 ; G06F21/54

Abstract:
Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a protected process are modified upon loading by injecting a runtime protector that creates a copy of each of the process' imported libraries and maps the copy into a random address inside the process' address space to form a “randomized” shadow library. The libraries loaded at the original address are modified into a stub library. Shadow and stub libraries are also created for libraries that are loaded after the process creation is finalized. Consequently, when malicious code attempts to retrieve the address of a given procedure, it receives the address of the stub procedure, thereby neutralizing the malicious code. When the original program's code (e.g., the non-malicious code) attempts to retrieve the address of a procedure, it receives the correct address of the requested procedure (located in the shadow library).
Public/Granted literature
- US20170206357A1 MALICIOUS CODE PROTECTION FOR COMPUTER SYSTEMS BASED ON PROCESS MODIFICATION Public/Granted day:2017-07-20
Information query