US20150089651A1 - Methods of detection of software exploitation - Google Patents
Methods of detection of software exploitation Download PDFInfo
- Publication number
- US20150089651A1 US20150089651A1 US14/558,227 US201414558227A US2015089651A1 US 20150089651 A1 US20150089651 A1 US 20150089651A1 US 201414558227 A US201414558227 A US 201414558227A US 2015089651 A1 US2015089651 A1 US 2015089651A1
- Authority
- US
- United States
- Prior art keywords
- address
- exception handler
- stack
- computing device
- exception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- a first embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing certain steps if a function to create a process or a function to load a library is called.
- the steps performed may include examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
- the processing element 12 may include processors, microprocessors, microcontrollers, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), analog and/or digital application-specific integrated circuits (ASICs), and the like, or combinations thereof.
- the processing element 12 may generally execute, process, or run instructions, code, code segments, software, firmware, programs, applications, apps, processes, services, daemons, or the like, or may step through states of a finite-state machine.
- the method 100 determines whether the bottom of the stack includes the address of the start of the thread. If the bottom of the stack does not include the address of the start of the thread, then it may be noted in an internal log that the bottom of the stack does not include the thread start address. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of the method 100 are performed to provide additional analysis. If the bottom of the stack does include the thread start address, then at least a portion of the remaining steps of the method 100 are performed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
Description
- The current patent application is a divisional patent application which claims priority benefit, with regard to all common subject matter, of U.S. patent application Ser. No. 13/942,385, titled “METHODS OF DETECTION OF SOFTWARE EXPLOITATION”, filed Jul. 15, 2013. The earlier-identified patent application is herein incorporated by reference in its entirety in the current patent application.
- 1. Field of the Invention
- Embodiments of the current invention relate to the detection of malicious computer software.
- 2. Description of the Related Art
- Software exploitation, also known as computer viruses, malware, spyware, adware, worms, and the like, is utilized by an attacker to gain access to a user's computer system in order to obtain sensitive information, monitor the activities of the user, or control the operation of the system. The exploitation often occurs when the user receives data from other parties or external systems such as while browsing the Internet or receiving email. The exploitation may take advantage of security defects in the programming of applications such as web browsers or email readers.
- Embodiments of the current invention solve the above-mentioned problems and provide a distinct advance in the art of the detection of malicious computer software.
- A first embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing certain steps if a function to create a process or a function to load a library is called. The steps performed may include examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
- A second embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing certain steps if a function to create a process or a function to load a library is called. The steps performed may include examining a plurality of items on a stack, determining instructions that placed items on the stack, determining whether the instructions include valid subroutine calls, and determining whether the instructions are located in an address space for executable code.
- A third embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing certain steps if a function to create a process or a function to load a library is called. The steps performed may include examining a plurality of items on a stack, examining a chain of exception handlers, each exception handler including a first address pointing to the next exception handler and a second address pointing to instructions for handling an exception, and determining for each exception handler whether the second address is located in an address space for executable code.
- A fourth embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes, threads, and applets executing on a computing device, monitoring instructions executed by processes, threads, and applets that are currently running, monitoring any file that is created by the applets, determining whether the file is being executed as an additional process, and determining whether the file is being loaded as a library.
- A fifth embodiment of the invention provides a method for detecting software exploitation broadly comprising the steps of gathering information about processes, threads, and applets executing on a computing device, monitoring instructions executed by processes, threads, and applets that are currently running, utilizing a programming interface, and determining whether a system.setsecuritymanager(null) call is made followed by a processbuilder.start( )call.
- This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Other aspects and advantages of the current invention will be apparent from the following detailed description of the embodiments and the accompanying drawing figures.
- Embodiments of the current invention are described in detail below with reference to the attached drawing figures, wherein:
-
FIG. 1 is a view of a plurality of computing devices for detecting software exploitation, as constructed in accordance with various embodiments of the current invention; -
FIG. 2 is a block schematic diagram of a processing element and a memory element, which are components of the computing devices ofFIG. 1 ; -
FIG. 3A is a flow diagram of a first portion of the steps of a method for detecting software exploitation in accordance with another embodiment of the current invention; and -
FIG. 3B is a flow diagram of a second portion of the steps of the method ofFIG. 3A . - The drawing figures do not limit the current invention to the specific embodiments disclosed and described herein. The drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the invention.
- The following detailed description of the invention references the accompanying drawings that illustrate specific embodiments in which the invention can be practiced. The embodiments are intended to describe aspects of the invention in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments can be utilized and changes can be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense. The scope of the present invention is defined only by the appended claims, along with the full scope of equivalents to which such claims are entitled.
- In this description, references to “one embodiment”, “an embodiment”, or “embodiments” mean that the feature or features being referred to are included in at least one embodiment of the technology. Separate references to “one embodiment”, “an embodiment”, or “embodiments” in this description do not necessarily refer to the same embodiment and are also not mutually exclusive unless so stated and/or except as will be readily apparent to those skilled in the art from the description. For example, a feature, structure, act, etc. described in one embodiment may also be included in other embodiments, but is not necessarily included. Thus, the current technology can include a variety of combinations and/or integrations of the embodiments described herein.
-
Computing devices 10 for detecting software exploitation, constructed in accordance with various embodiments of the current invention, are shown inFIG. 1 . Thecomputing devices 10 may include devices such as a server computer, a desktop computer, a work station computer, a laptop computer, and the like. Certain embodiments of the current invention may be implemented in hardware, firmware, software, or combinations thereof. Eachcomputing device 10 may comprise aprocessing element 12 coupled with amemory element 14, as shown inFIG. 2 . - The
processing element 12 may include processors, microprocessors, microcontrollers, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), analog and/or digital application-specific integrated circuits (ASICs), and the like, or combinations thereof. Theprocessing element 12 may generally execute, process, or run instructions, code, code segments, software, firmware, programs, applications, apps, processes, services, daemons, or the like, or may step through states of a finite-state machine. - Typically, the
processing element 12 comprises processors with an x86 type architecture that includes components such as general purpose registers, index registers, segment registers, base pointers, stack pointers, and the like. Theprocessing element 12 may utilize an instruction set that includes instructions from the x86 instruction set. Furthermore, theprocessing element 12 may execute a Windows& based operating system, produced by the Microsoft Corporation in Redmond, Wash., although other operating systems are also possible. - The
memory element 14 may include data storage components such as read-only memory (ROM), programmable ROM, erasable programmable ROM, random-access memory (RAM), hard disks, floppy disks, optical disks, flash memory, thumb drives, universal serial bus (USB) drives, and the like, or combinations thereof. Thememory element 14 may include, or may constitute, a “computer-readable medium” or “computer-readable storage medium” that is non-transitory in nature. Thememory element 14 may store the instructions, code, code segments, software, firmware, programs, applications, apps, services, daemons, or the like that are executed by theprocessing element 12. Thememory element 14 may also store settings, data, documents, sound files, photographs, movies, images, databases, and the like. Theprocessing element 12 may be in communication with thememory element 14 through address busses, data busses, control lines, and the like. - The
memory element 14 may include a physical address space and at least a portion of a virtual address space and may be used to implement a file system. Thememory element 14 may also be utilized to form one or more stacks, one or more heaps, and other data storage structures. A stack may include a plurality of data storage units (typically memory address locations) that operate as a last-in, first-out (LIFO) component. The stack may include a top address and a bottom address. The stack typically stores data associated with function and subroutine calls. A stack pointer may be used in conjunction with the stack, such that the stack pointer usually contains the address of the next available location in the stack. A heap may include a plurality of data storage units that operate as a random-access storage area. The heap may be utilized for processing of data that is input from users or other sources. - At least a portion of the steps of a
method 100 for detecting software exploitation, in accordance with an embodiment of the current invention, is shown inFIGS. 3A and 3B . Themethod 100 may be partially or wholly implemented as a program that is generally stored in thememory element 14 on a computer-readable medium and executed by theprocessing element 12 in thecomputing device 10 when thecomputing device 10 is powered on. Typically, a user is not aware that themethod 100 is executing. Themethod 100 may be included in at least one process that is running continuously on thecomputing device 10, although portions of themethod 100 may be executed only when certain events occur. For example, some steps of themethod 100 may be executed only when a running application attempts to execute another application, load a dynamically linked library (DLL), or perform a similar action that introduces new code to be executed. The steps may be performed in the order as shown inFIGS. 3A and 3B , or they may be performed in a different order. Furthermore, some steps may be performed concurrently as opposed to sequentially. In addition, some steps may be omitted. - With reference to step 101, information is gathered about currently running processes, threads, and loaded modules. A process may be an instance of a program or application that is running. Threads and modules may be portions of a program, and each program may include a plurality of both threads and modules. In various embodiments, the
method 100 gather information about all processes that are currently running. In other embodiments, themethod 100 may gather information about processes that receive data from or communicate with sources external to thecomputing device 10, such as a local, metro, or wide area network, or the Internet. For example, themethod 100 may gather information about Internet access or browsing programs, electronic mail programs, or the like. Each process, thread, and module may include an executable code section and a data section. The information gathered may include information that is available in a thread information block (TIB), also known as a thread environment block (TEB), which is created by the operating system. The TIB may include data such as a pointer to a structured exception handling frame, addresses of the top and the bottom of the stack, identification data (e.g., process ID, thread ID), and the like. This information is specific to each thread and does not change during the execution of the thread. - The information gathered may also include a list of modules that are components of each process along with an address range or position of the code section and the data section of each module within the virtual address space assigned to the process. The information on modules may also include the location of the module in the file system. This information may be utilized to exclude certain applications from being subjected to other steps of the method so as to avoid any potential false positive exploitation detection results. The information gathered may further include a list of exported functions from each module and their addresses within the code section of the module.
- With reference to step 102, the instructions that are executed by the current process are monitored to determine whether functions to create a process or load a library are called. Examples of the functions include “CreateProcess” and “LoadLibrary” that are used in a Windows®-based programming environment. If either function is called, then at least a portion of the remaining steps of the method is performed.
- With reference to step 103, the stack pointer of the current thread is examined to determine whether it is pointing outside of the range specified in the TIB. The range of virtual address locations for the stack of the current thread may be listed in the TIB. If the stack pointer contains an address that is not within the TIB listed range, then it may be noted in an internal log that the address in the stack pointer pointed outside of the range listed in the TIB. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of the
method 100 are performed to provide additional analysis. If the stack pointer includes a valid address within the TIB listed range, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 104, the contents of the stack are examined and the instructions that placed items on the stack are determined. Typically, when a process calls a subroutine, several items are placed on the stack between boundaries known as a frame. The frame is created when the subroutine is called and destroyed when the subroutine is complete. At least one of the items in the frame is a return address to which the flow of execution returns after the subroutine is complete. Usually, the return address is directly after the address of the command that called the subroutine.
- With reference to step 105, the
method 100 determines whether the instructions include valid subroutine calls. The command or instruction at the address before the return address may be examined. Since subroutines may call other subroutines, the return address in each frame, starting with the most recent one, is followed to examine the instruction at the address before the return address. If any of the instructions is not a valid subroutine call, then it may be noted in an internal log that at least one instruction the addresses before return addresses is not a valid subroutine call. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If all of the instructions in the addresses before return addresses are valid subroutine calls, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 106, the
method 100 determines whether the instructions are located in an address space for executable code. The return address in each frame is examined. If any return address is not in an executable code section of the process, then it may be noted in an internal log that at least one return addresses is not located in an executable code section. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If all of the instructions in the return addresses are located in valid executable code sections, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 107, the
method 100 determines whether the stack includes the return address of the DLL that created the thread. Typically, this may be NTDLL.dll, although other dynamic link libraries may be used. If the return address is not found, then it may be noted in an internal log that the return address of the DLL that created the thread was not found. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If the return address of the DLL that created the thread is found, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 108, the
method 100 determines whether the bottom of the stack includes the address of the start of the thread. If the bottom of the stack does not include the address of the start of the thread, then it may be noted in an internal log that the bottom of the stack does not include the thread start address. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If the bottom of the stack does include the thread start address, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 109, a chain of exception handlers is examined and it is determined whether any exception handler is outside the stack. An exception handler is a set of instructions for handling unusual situations during the execution of a process, such as performing an indeterminate math function, receiving unexpected data from the user, or the like. Typically, the exception handlers are stored on the stack in a linked list fashion. Thus, each exception handler may include a pointer to the set of executable instructions, in the executable code section, as well as a pointer to the next handler. The
method 100 may determine whether all pointers to the next handler point within the stack. If any pointers to the next handler point outside of the stack, then it may be noted in an internal log that a pointer to the next exception handler in the chain of exception handlers points outside of the stack. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If all of the next exception handler pointers point inside the stack, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 110, the
method 100 determines whether all of the pointers to the exception handler set of executable instructions are located in the executable code section. If any exception handler pointer does not point to the executable code section, then it may be noted in an internal log that at least one exception handler pointer does not point to the executable code section. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If all of the exception handler pointers point to the executable code section, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 111, the
method 100 determines whether the chain of exception handlers forms a loop. In other words, it is determined whether any pointers to the next exception handler point to previous exception handlers. If so, then it may be noted in an internal log that a pointer to the next exception handler in the chain of exception handlers points to a previous exception handler. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of themethod 100 are performed to provide additional analysis. If none of the next exception handler pointers point to previous exception handlers, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 112, the memory addresses commonly used by heap sprays are examined and the method determines whether two nopsleds are separated by shellcode. A heap spray is a technique that places a certain sequence of instructions at a predetermined location in the address space. Exemplary predetermined addresses may include 0x09090909 and 0x0C0C000C. The instructions may include a plurality of no operation (NOP) instructions that form a “nopsled” or a “nopslide”. Heap spraying may further involve placing a first nopsled followed by shellcode followed by a second nopsled. The shellcode may include commands that an attacker wishes to execute. If two nopsleds are found that are separated by shellcode, then it may be noted in an internal log that two nopsleds have been found that are separated by shellcode. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of the
method 100 are performed to provide additional analysis. If the nopsled-shellcode-nopsled sequence is not found, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 113, any file that is created by an applet is examined to determine whether it is being executed or loaded as a library. The applet may be a subprogram or subprocess that is typically launched by an existing process as opposed to being directly executed by the user. For example, the user may execute a web browser which in turn may launch applets depending on the content of the web page being viewed. An exemplary platform for launching applets is Java™ produced by Oracle Corporation of Redwood Shores, Calif. The applet may create or receive a file to be stored in the file system. If the file is subsequently executed as an additional process or loaded as a library, then it may be noted in an internal log that an applet-created file has been executed or loaded as a library. In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. Unless the process is terminated, at least a portion of the remaining steps of the
method 100 are performed to provide additional analysis. If the applet-created file is not executed or loaded as a library, then at least a portion of the remaining steps of themethod 100 are performed. - With reference to step 114, a programming interface is utilized to determine whether system.setsecuritymanager(null) is called followed by processbuilder.start( ). The programming interface may allow a process to inspect the state of and control the execution of applications running in a Java™ Virtual Machine, which is a run-time environment in which Java™ byte code can be executed. An exemplary programming interface is the Java™ virtual machine tool interface (JVMTI). The function system.setsecuritymanager(null) may remove or turn off Java™ security measures for the process. The function processbuilder.start( )may create a new process instance. If these two functions are called in succession, then it may be noted in an internal log that system.setsecuritymanager(null) was called followed by processbuilder.start( ). In some embodiments, a message may also be displayed to the user that a possible exploit has been detected. In other embodiments, the call to create a new process or to load a library may be automatically blocked, or the process may also be terminated. If the functions are not called, then no further actions may be taken.
- Although the invention has been described with reference to the embodiments illustrated in the attached drawing figures, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims.
Claims (16)
1. A non-transitory computer-readable storage medium with an executable program stored thereon for detecting software exploitation, wherein the program instructs a processing element to perform the following steps:
gathering information about processes and threads executing on a computing device;
monitoring instructions executed by a thread that is currently running; and
performing the following steps when a function to create a process or a function to load a library is called
examining a plurality of items on a stack,
examining a chain of exception handlers, each exception handler including a first address pointing to the next exception handler and a second address pointing to instructions for handling an exception, and
determining for each exception handler whether the second address is located in an address space for executable code.
2. The computer-readable storage medium of claim 1 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the second addresses is not located in the address space for executable code.
3. The computer-readable storage medium of claim 1 , wherein the program further comprises the step of determining for each exception handler whether the first address is within the stack.
4. The computer-readable storage medium of claim 3 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the first addresses is not located within the stack.
5. The computer-readable storage medium of claim 1 , wherein the program further comprises the step of determining for each exception handler whether the first address points to a previous exception handler.
6. The computer-readable storage medium of claim 5 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the first addresses points to a previous exception handler.
7. A non-transitory computer-readable storage medium with an executable program stored thereon for detecting software exploitation, wherein the program instructs a processing element to perform the following steps:
gathering information about processes and threads executing on a computing device;
monitoring instructions executed by a thread that is currently running; and
performing the following steps when a function to create a process or a function to load a library is called
examining a plurality of items on a stack,
examining a chain of exception handlers, each exception handler including a first address pointing to the next exception handler and a second address pointing to instructions for handling an exception,
determining for each exception handler whether the first address is within the stack,
determining for each exception handler whether the first address points to a previous exception handler, and
determining for each exception handler whether the second address is located in an address space for executable code.
8. The computer-readable storage medium of claim 7 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the first addresses is not located within the stack.
9. The computer-readable storage medium of claim 7 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the first addresses points to a previous exception handler.
10. The computer-readable storage medium of claim 7 , wherein the program further comprises the step of displaying a message to a user that a possible software exploit has been detected when any one of the second addresses is not located in the address space for executable code.
11. A computing device for detecting software exploitation, the computing device comprising:
a processing element coupled to a memory element, wherein the processing element is configured to detect software exploitation by:
gathering information about processes and threads executing on a computing device;
monitoring instructions executed by a thread that is currently running; and
performing the following steps when a function to create a process or a function to load a library is called
examining a plurality of items on a stack,
examining a chain of exception handlers, each exception handler including a first address pointing to the next exception handler and a second address pointing to instructions for handling an exception, and
determining for each exception handler whether the second address is located in an address space for executable code.
12. The computing device of claim 11 , wherein the processing element is further configured to detect software exploitation by displaying a message to a user that a possible software exploit has been detected when any one of the second addresses is not located in the address space for executable code.
13. The computing device of claim 11 , wherein the processing element is further configured to detect software exploitation by determining for each exception handler whether the first address is within the stack.
14. The computing device of claim 13 , wherein the processing element is further configured to detect software exploitation by displaying a message to a user that a possible software exploit has been detected when any one of the first addresses is not located within the stack.
15. The computing device of claim 11 , wherein the processing element is further configured to detect software exploitation by determining for each exception handler whether the first address points to a previous exception handler.
16. The computing device of claim 15 , wherein the processing element is further configured to detect software exploitation by displaying a message to a user that a possible software exploit has been detected when any one of the first addresses points to a previous exception handler.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/558,227 US20150089651A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/942,385 US8943592B1 (en) | 2013-07-15 | 2013-07-15 | Methods of detection of software exploitation |
US14/558,227 US20150089651A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/942,385 Division US8943592B1 (en) | 2013-07-15 | 2013-07-15 | Methods of detection of software exploitation |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150089651A1 true US20150089651A1 (en) | 2015-03-26 |
Family
ID=52278259
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/942,385 Active 2033-07-24 US8943592B1 (en) | 2013-07-15 | 2013-07-15 | Methods of detection of software exploitation |
US14/558,265 Abandoned US20150089652A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/558,227 Abandoned US20150089651A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/558,310 Abandoned US20150089653A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/558,206 Abandoned US20150089650A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/736,032 Abandoned US20150278522A1 (en) | 2013-07-15 | 2015-06-10 | Methods of detection of software exploitation |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/942,385 Active 2033-07-24 US8943592B1 (en) | 2013-07-15 | 2013-07-15 | Methods of detection of software exploitation |
US14/558,265 Abandoned US20150089652A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/558,310 Abandoned US20150089653A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/558,206 Abandoned US20150089650A1 (en) | 2013-07-15 | 2014-12-02 | Methods of detection of software exploitation |
US14/736,032 Abandoned US20150278522A1 (en) | 2013-07-15 | 2015-06-10 | Methods of detection of software exploitation |
Country Status (2)
Country | Link |
---|---|
US (6) | US8943592B1 (en) |
CA (1) | CA2856268C (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919838A (en) * | 2016-11-10 | 2017-07-04 | 深圳市安之天信息技术有限公司 | A kind of malicious code encryption configuration localization method and system |
WO2019133637A1 (en) | 2017-12-29 | 2019-07-04 | Sonicwall Inc. | Detection of exploitative program code |
US11151252B2 (en) | 2017-10-13 | 2021-10-19 | Sonicwall Inc. | Just in time memory analysis for malware detection |
US11232201B2 (en) | 2018-05-14 | 2022-01-25 | Sonicwall Inc. | Cloud based just in time memory analysis for malware detection |
US11558405B2 (en) | 2017-08-08 | 2023-01-17 | Sonicwall Inc. | Real-time prevention of malicious content via dynamic analysis |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8943592B1 (en) * | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
US9292684B2 (en) | 2013-09-06 | 2016-03-22 | Michael Guidry | Systems and methods for security in computer systems |
US9961102B2 (en) * | 2014-07-16 | 2018-05-01 | Mcafee, Llc | Detection of stack pivoting |
US10657262B1 (en) | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
US9767272B2 (en) * | 2014-10-20 | 2017-09-19 | Intel Corporation | Attack Protection for valid gadget control transfers |
US10380593B2 (en) | 2014-11-10 | 2019-08-13 | Mastercard International Incorporated | Systems and methods for detecting compromised automated teller machines |
US20160357958A1 (en) * | 2015-06-08 | 2016-12-08 | Michael Guidry | Computer System Security |
US10803165B2 (en) | 2015-06-27 | 2020-10-13 | Mcafee, Llc | Detection of shellcode |
US11120106B2 (en) | 2016-07-30 | 2021-09-14 | Endgame, Inc. | Hardware—assisted system and method for detecting and analyzing system calls made to an operating system kernel |
US10489592B1 (en) * | 2017-03-21 | 2019-11-26 | Symantec Corporation | Creating an execution safety container for unreliable exploits |
US11151247B2 (en) * | 2017-07-13 | 2021-10-19 | Endgame, Inc. | System and method for detecting malware injected into memory of a computing device |
US11151251B2 (en) | 2017-07-13 | 2021-10-19 | Endgame, Inc. | System and method for validating in-memory integrity of executable files to identify malicious activity |
US10185595B1 (en) * | 2018-06-04 | 2019-01-22 | Confia Systems, Inc. | Program verification using hash chains |
CN112637191A (en) * | 2020-12-19 | 2021-04-09 | 郑州航空工业管理学院 | Network information security management system |
US11132443B1 (en) * | 2021-01-29 | 2021-09-28 | Malwarebytes Inc. | Exception handlers in a sandbox environment for malware detection |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070101392A1 (en) * | 2005-10-31 | 2007-05-03 | Microsoft Corporation | Direct computing experience |
US20100262688A1 (en) * | 2009-01-21 | 2010-10-14 | Daniar Hussain | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
US20110194438A1 (en) * | 2010-02-10 | 2011-08-11 | Zarlink Semiconductor Inc. | Clock Recovery Method over Packet Switched Networks based on Network Quiet Period Detection |
US20110277035A1 (en) * | 2010-05-07 | 2011-11-10 | Mcafee, Inc. | Detection of Malicious System Calls |
US8347391B1 (en) * | 2012-05-23 | 2013-01-01 | TrustPipe LLC | System and method for detecting network activity of interest |
US20140090055A1 (en) * | 2012-09-27 | 2014-03-27 | F-Secure Corporation | Automated Detection of Harmful Content |
US20140201843A1 (en) * | 2013-01-15 | 2014-07-17 | Beyondtrust Software, Inc. | Systems and methods for identifying and reporting application and file vulnerabilities |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6212566B1 (en) * | 1996-01-26 | 2001-04-03 | Imec | Interprocess communication protocol system modem |
US7099949B1 (en) * | 1995-10-23 | 2006-08-29 | Imec Vzw | Interprocess communication protocol system |
EP0952522B1 (en) * | 1998-04-22 | 2011-08-24 | Nippon Telegraph And Telephone Corporation | Method and device for acquiring usage data of an application |
US6934950B1 (en) * | 2000-06-06 | 2005-08-23 | International Business Machines Corporation | Thread dispatcher for multi-threaded communication library |
US7584509B2 (en) * | 2004-06-12 | 2009-09-01 | Microsoft Corporation | Inhibiting software tampering |
US7721340B2 (en) * | 2004-06-12 | 2010-05-18 | Microsoft Corporation | Registry protection |
US7308083B2 (en) * | 2004-06-30 | 2007-12-11 | Glenayre Electronics, Inc. | Message durability and retrieval in a geographically distributed voice messaging system |
US7937717B2 (en) * | 2004-09-13 | 2011-05-03 | Tvworks, Llc | Method and apparatus enabling multiple application sharing of classes |
US7650640B1 (en) | 2004-10-18 | 2010-01-19 | Symantec Corporation | Method and system for detecting IA32 targeted buffer overflow attacks |
JP3920892B2 (en) * | 2005-03-18 | 2007-05-30 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal device |
US7966426B2 (en) * | 2006-11-14 | 2011-06-21 | Microsoft Corporation | Offline synchronization capability for client application |
US8037536B2 (en) * | 2007-11-14 | 2011-10-11 | Bank Of America Corporation | Risk scoring system for the prevention of malware |
US8185610B2 (en) * | 2007-12-04 | 2012-05-22 | International Business Machines Corporation | Method for client-side aggregation of asynchronous, context-sensitive request operations for java server pages (JSP) |
US8065734B1 (en) * | 2008-03-06 | 2011-11-22 | Symantec Corporation | Code module operating system (OS) interactions intercepting system and method |
US8272059B2 (en) | 2008-05-28 | 2012-09-18 | International Business Machines Corporation | System and method for identification and blocking of malicious code for web browser script engines |
US8181251B2 (en) * | 2008-12-18 | 2012-05-15 | Symantec Corporation | Methods and systems for detecting malware |
CA2774728C (en) | 2009-11-13 | 2019-02-12 | Irdeto Canada Corporation | System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments |
US8479286B2 (en) * | 2009-12-15 | 2013-07-02 | Mcafee, Inc. | Systems and methods for behavioral sandboxing |
US8307435B1 (en) | 2010-02-18 | 2012-11-06 | Symantec Corporation | Software object corruption detection |
EP2388726B1 (en) * | 2010-05-18 | 2014-03-26 | Kaspersky Lab, ZAO | Detection of hidden objects in a computer system |
US8850526B2 (en) * | 2010-06-23 | 2014-09-30 | K7 Computing Private Limited | Online protection of information and resources |
US8869097B2 (en) * | 2011-03-23 | 2014-10-21 | Infosys Limited | Online integrated development environment with code assist |
US20120254993A1 (en) | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
US9323928B2 (en) | 2011-06-01 | 2016-04-26 | Mcafee, Inc. | System and method for non-signature based detection of malicious processes |
US20130055369A1 (en) | 2011-08-24 | 2013-02-28 | Mcafee, Inc. | System and method for day-zero authentication of activex controls |
US9805350B2 (en) * | 2012-07-16 | 2017-10-31 | Infosys Limited | System and method for providing access of digital contents to offline DRM users |
US9047293B2 (en) * | 2012-07-25 | 2015-06-02 | Aviv Grafi | Computer file format conversion for neutralization of attacks |
RU2522019C1 (en) * | 2012-12-25 | 2014-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of detecting threat in code executed by virtual machine |
US9467465B2 (en) * | 2013-02-25 | 2016-10-11 | Beyondtrust Software, Inc. | Systems and methods of risk based rules for application control |
US8943592B1 (en) * | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
-
2013
- 2013-07-15 US US13/942,385 patent/US8943592B1/en active Active
-
2014
- 2014-07-09 CA CA2856268A patent/CA2856268C/en active Active
- 2014-12-02 US US14/558,265 patent/US20150089652A1/en not_active Abandoned
- 2014-12-02 US US14/558,227 patent/US20150089651A1/en not_active Abandoned
- 2014-12-02 US US14/558,310 patent/US20150089653A1/en not_active Abandoned
- 2014-12-02 US US14/558,206 patent/US20150089650A1/en not_active Abandoned
-
2015
- 2015-06-10 US US14/736,032 patent/US20150278522A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070101392A1 (en) * | 2005-10-31 | 2007-05-03 | Microsoft Corporation | Direct computing experience |
US20100262688A1 (en) * | 2009-01-21 | 2010-10-14 | Daniar Hussain | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
US20110194438A1 (en) * | 2010-02-10 | 2011-08-11 | Zarlink Semiconductor Inc. | Clock Recovery Method over Packet Switched Networks based on Network Quiet Period Detection |
US20110277035A1 (en) * | 2010-05-07 | 2011-11-10 | Mcafee, Inc. | Detection of Malicious System Calls |
US8347391B1 (en) * | 2012-05-23 | 2013-01-01 | TrustPipe LLC | System and method for detecting network activity of interest |
US20140090055A1 (en) * | 2012-09-27 | 2014-03-27 | F-Secure Corporation | Automated Detection of Harmful Content |
US20140201843A1 (en) * | 2013-01-15 | 2014-07-17 | Beyondtrust Software, Inc. | Systems and methods for identifying and reporting application and file vulnerabilities |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919838A (en) * | 2016-11-10 | 2017-07-04 | 深圳市安之天信息技术有限公司 | A kind of malicious code encryption configuration localization method and system |
US11558405B2 (en) | 2017-08-08 | 2023-01-17 | Sonicwall Inc. | Real-time prevention of malicious content via dynamic analysis |
US12058154B2 (en) | 2017-08-08 | 2024-08-06 | Sonicwall Inc. | Real-time prevention of malicious content via dynamic analysis |
US11151252B2 (en) | 2017-10-13 | 2021-10-19 | Sonicwall Inc. | Just in time memory analysis for malware detection |
US12001554B2 (en) | 2017-10-13 | 2024-06-04 | Sonicwall Inc. | Just in time memory analysis for malware detection |
WO2019133637A1 (en) | 2017-12-29 | 2019-07-04 | Sonicwall Inc. | Detection of exploitative program code |
EP3732571A4 (en) * | 2017-12-29 | 2021-09-01 | SonicWall Inc. | Detection of exploitative program code |
US11550912B2 (en) | 2017-12-29 | 2023-01-10 | Sonicwall Inc. | Detection of exploitative program code |
US11232201B2 (en) | 2018-05-14 | 2022-01-25 | Sonicwall Inc. | Cloud based just in time memory analysis for malware detection |
US11797677B2 (en) | 2018-05-14 | 2023-10-24 | Sonicwall Inc. | Cloud based just in time memory analysis for malware detection |
US12079340B2 (en) | 2018-05-14 | 2024-09-03 | Sonicwall Inc. | Cloud based just in time memory analysis for malware detection |
Also Published As
Publication number | Publication date |
---|---|
US20150089652A1 (en) | 2015-03-26 |
US20150089653A1 (en) | 2015-03-26 |
US8943592B1 (en) | 2015-01-27 |
CA2856268A1 (en) | 2015-01-15 |
US20150089650A1 (en) | 2015-03-26 |
US20150278522A1 (en) | 2015-10-01 |
CA2856268C (en) | 2017-08-01 |
US20150020198A1 (en) | 2015-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8943592B1 (en) | Methods of detection of software exploitation | |
EP3506139B1 (en) | Malware detection in event loops | |
US10284591B2 (en) | Detecting and preventing execution of software exploits | |
EP3039608B1 (en) | Hardware and software execution profiling | |
EP3123311B1 (en) | Malicious code protection for computer systems based on process modification | |
JP4901842B2 (en) | Method and system for whitelisting software components | |
US20160224789A1 (en) | System and method for hypervisor-based security | |
US8539578B1 (en) | Systems and methods for defending a shellcode attack | |
US8256000B1 (en) | Method and system for identifying icons | |
US9659173B2 (en) | Method for detecting a malware | |
US9542557B2 (en) | Snoop-based kernel integrity monitoring apparatus and method thereof | |
US9177149B2 (en) | Method of detecting malware in an operating system kernel | |
US11055168B2 (en) | Unexpected event detection during execution of an application | |
Nadim et al. | Characteristic features of the kernel-level rootkit for learning-based detection model training | |
CN113176926B (en) | API dynamic monitoring method and system based on virtual machine introspection technology | |
US11361077B2 (en) | Kernel-based proactive engine for malware detection | |
JP2017174426A (en) | User-mode component injection techniques | |
US8863159B2 (en) | System, method and computer program product for inserting an emulation layer in association with a COM server DLL | |
KR102581932B1 (en) | Methods and devices for detecting seh overwrite mitigation bypass using a reverting engine | |
EP3293660A1 (en) | System and method of detecting malicious code in files | |
Aboughadareh et al. | Mixed-mode malware and its analysis | |
US12001545B2 (en) | Detecting stack pivots using stack artifact verification | |
Voitovych et al. | Hidden process detection for windows operating systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |