KR20080035564A - 실행 프로세스에서 코드 실행 경로를 재지정하는 방법 및컴퓨터 판독가능 매체 - Google Patents

실행 프로세스에서 코드 실행 경로를 재지정하는 방법 및컴퓨터 판독가능 매체 Download PDF

Info

Publication number
KR20080035564A
KR20080035564A KR1020087000500A KR20087000500A KR20080035564A KR 20080035564 A KR20080035564 A KR 20080035564A KR 1020087000500 A KR1020087000500 A KR 1020087000500A KR 20087000500 A KR20087000500 A KR 20087000500A KR 20080035564 A KR20080035564 A KR 20080035564A
Authority
KR
South Korea
Prior art keywords
interrupt
instruction
code
code execution
kernel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
KR1020087000500A
Other languages
English (en)
Korean (ko)
Inventor
니르 벤-즈비
Original Assignee
마이크로소프트 코포레이션
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 마이크로소프트 코포레이션 filed Critical 마이크로소프트 코포레이션
Publication of KR20080035564A publication Critical patent/KR20080035564A/ko
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/656Updates while running
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
  • Executing Machine-Instructions (AREA)
  • Retry When Errors Occur (AREA)
KR1020087000500A 2005-07-08 2006-07-10 실행 프로세스에서 코드 실행 경로를 재지정하는 방법 및컴퓨터 판독가능 매체 Withdrawn KR20080035564A (ko)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/177,079 2005-07-08
US11/177,079 US7500245B2 (en) 2005-07-08 2005-07-08 Changing code execution path using kernel mode redirection

Publications (1)

Publication Number Publication Date
KR20080035564A true KR20080035564A (ko) 2008-04-23

Family

ID=37619714

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020087000500A Withdrawn KR20080035564A (ko) 2005-07-08 2006-07-10 실행 프로세스에서 코드 실행 경로를 재지정하는 방법 및컴퓨터 판독가능 매체

Country Status (8)

Country Link
US (1) US7500245B2 (enExample)
EP (1) EP1902353A2 (enExample)
JP (1) JP2009501369A (enExample)
KR (1) KR20080035564A (enExample)
CN (1) CN101535969A (enExample)
NO (1) NO20076359L (enExample)
RU (1) RU2007148413A (enExample)
WO (1) WO2007008880A2 (enExample)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7979911B2 (en) * 2003-10-08 2011-07-12 Microsoft Corporation First computer process and second computer process proxy-executing code from third computer process on behalf of first process
US8103592B2 (en) * 2003-10-08 2012-01-24 Microsoft Corporation First computer process and second computer process proxy-executing code on behalf of first process
US8510596B1 (en) 2006-02-09 2013-08-13 Virsec Systems, Inc. System and methods for run time detection and correction of memory corruption
US7950001B2 (en) * 2006-09-08 2011-05-24 International Business Machines Corporation Method and apparatus for instrumentation in a multiprocessing environment
WO2015038944A1 (en) 2013-09-12 2015-03-19 Virsec Systems, Inc. Automated runtime detection of malware
EP3161715A1 (en) 2014-06-24 2017-05-03 Virsec Systems, Inc. System and methods for automated detection of input and output validation and resource management vulnerability
US9459858B2 (en) * 2015-01-07 2016-10-04 International Business Machines Corporation Selectively hotpatching only a selection of processes of a running instance of an application that match a selection criteria
US11409870B2 (en) 2016-06-16 2022-08-09 Virsec Systems, Inc. Systems and methods for remediating memory corruption in a computer application
CN109582300A (zh) * 2018-11-30 2019-04-05 阿里巴巴集团控股有限公司 基于路径的代码变更分析方法、装置及设备
CN109933985B (zh) * 2019-02-25 2022-02-25 百度在线网络技术(北京)有限公司 一种绕过挂钩的方法、装置、设备和计算机存储介质
CN111897632B (zh) * 2019-05-05 2023-10-20 兆易创新科技集团股份有限公司 一种中断处理方法、装置、电子设备及存储介质
CN112269739B (zh) * 2020-10-26 2024-07-19 广州华多网络科技有限公司 网页测试方法及其装置、设备、介质
CN113672273B (zh) * 2021-10-21 2022-04-15 阿里云计算有限公司 数据处理方法、系统及设备

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5671396A (en) * 1994-12-05 1997-09-23 Intel Corporation M and A for executing firmware of an add-on FAX/Modem card on the host processor while maintaining compatibility
US5991790A (en) * 1996-07-01 1999-11-23 Sun Microsystems, Inc. Generation and delivery of signals in a two-level, multithreaded system
US5867699A (en) * 1996-07-25 1999-02-02 Unisys Corporation Instruction flow control for an instruction processor
US7882247B2 (en) * 1999-06-11 2011-02-01 Netmotion Wireless, Inc. Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
US6961941B1 (en) * 2001-06-08 2005-11-01 Vmware, Inc. Computer configuration for resource management in systems including a virtual machine
US6775728B2 (en) * 2001-11-15 2004-08-10 Intel Corporation Method and system for concurrent handler execution in an SMI and PMI-based dispatch-execution framework
US20030145314A1 (en) * 2002-01-31 2003-07-31 Khoa Nguyen Method of efficient dynamic data cache prefetch insertion
US8612992B2 (en) * 2003-04-09 2013-12-17 Jaluna Sa Operating systems
US7117285B2 (en) * 2003-08-29 2006-10-03 Sun Microsystems, Inc. Method and system for efficiently directing interrupts
US7149832B2 (en) * 2004-11-10 2006-12-12 Microsoft Corporation System and method for interrupt handling
WO2006056988A2 (en) * 2004-11-24 2006-06-01 Discretix Technologies Ltd. System, method and apparatus of securing an operating system
US7380241B2 (en) * 2004-12-07 2008-05-27 International Business Machines Corporation Scalable and improved profiling of software programs

Also Published As

Publication number Publication date
JP2009501369A (ja) 2009-01-15
RU2007148413A (ru) 2009-07-10
WO2007008880A2 (en) 2007-01-18
CN101535969A (zh) 2009-09-16
US7500245B2 (en) 2009-03-03
WO2007008880A3 (en) 2009-04-09
US20070011686A1 (en) 2007-01-11
EP1902353A2 (en) 2008-03-26
NO20076359L (no) 2008-02-01

Similar Documents

Publication Publication Date Title
US9164754B1 (en) Runtime patching of native-code programs
US5938778A (en) System and method for tracing instructions in an information handling system without changing the system source code
US5870607A (en) Method and apparatus for selective replay of computer programs
US7581089B1 (en) Method of protecting a computer stack
KR101761498B1 (ko) 추론을 지원하는 게스트 반환 주소 스택 에뮬레이션을 위한 방법 및 장치
KR102206115B1 (ko) 인터프리터 가상 머신을 이용한 행동 멀웨어 탐지
US6698016B1 (en) Method for injecting code into another process
US7162710B1 (en) Dynamic modifications to a heterogeneous program in a distributed environment
US5257381A (en) Method of intercepting a global function of a network operating system and calling a monitoring function
US20120011491A1 (en) Efficient recording and replaying of the execution path of a computer program
ZA200306411B (en) System and method for restoring computer systems damaged by a malicious computer program.
US20100095281A1 (en) Internal Function Debugger
US9900324B1 (en) System to discover and analyze evasive malware
EP3973388B1 (en) Stack traces using shadow stack
US7500245B2 (en) Changing code execution path using kernel mode redirection
KR102315532B1 (ko) 바이너리 난수 주입을 통한 메모리 공유 기반 부채널 공격 방어 방법
KR20180039830A (ko) 코드 재사용 공격 탐지 장치 및 그 방법
JP4294084B2 (ja) ソフトウェアアプリケーションを実行する方法及び記録媒体
Kleissner Stoned bootkit
US7380269B2 (en) Changing code execution path using kernel mode redirection
US7685574B2 (en) Constrained execution regions
US20060277527A1 (en) Non-destructive debugging for add-ins
US7519944B2 (en) Computer method and system for executing post-processing logic depending on function exit type
CN105868633A (zh) 一种恶意软件感染后宿主软件中恶意代码识别方法
US20100057814A1 (en) Project Property Sheets

Legal Events

Date Code Title Description
PA0105 International application

Patent event date: 20080108

Patent event code: PA01051R01D

Comment text: International Patent Application

PG1501 Laying open of application
PC1203 Withdrawal of no request for examination
WITN Application deemed withdrawn, e.g. because no request for examination was filed or no examination fee was paid