Software object corruption detection
U Mann, N Doshi - US Patent 8,307,435, 2012 - Google Patents
The execution of a software application is diverted to detect software object corruption in the
software application. Software objects used by the software application are identified and …
software application. Software objects used by the software application are identified and …
Shellcode detection
E Thioux - US Patent 9,973,531, 2018 - Google Patents
According to one embodiment, a threat detection system is integrated with at least a dynamic
analysis engine. The dynamic analysis engine is configured to automatically determine …
analysis engine. The dynamic analysis engine is configured to automatically determine …
Computer exploit detection using heap spray pattern matching
E Thioux, S Vashisht, M Vincent - US Patent 9,438,623, 2016 - Google Patents
See application file for complete search history. region of allocated memory, and detect a
second pattern at one or more storage locations Subsequent to the first storage location with …
second pattern at one or more storage locations Subsequent to the first storage location with …
Ransomware detection and mitigation
J Singh, A Gupta - US Patent 10,503,904, 2019 - Google Patents
A computerized method for detecting and mitigating a ransomware attack is described. The
method features (i) a kernel mode agent that intercepts an initiation of a process, intercepts …
method features (i) a kernel mode agent that intercepts an initiation of a process, intercepts …
Control flow graph representation and classification
E Aktas, R Mathur - US Patent 9,438,620, 2016 - Google Patents
A software sample is identified that includes code and a control flow graph is generated for
each of a plurality of functions included in the sample. Features are identified in each of the …
each of a plurality of functions included in the sample. Features are identified in each of the …
Methods of identifying heap spray attacks using memory anomaly detection
S Paithane, SO Vashisht - US Patent 10,430,586, 2019 - Google Patents
A non-transitory storage medium including instructions that are executable by one or more
processors to perform operations including instrumenting a VM is shown. The VM is used to …
processors to perform operations including instrumenting a VM is shown. The VM is used to …
Proactive exploit detection
C Craioveanu, Y Lin, P Ferrie, B Dang - US Patent 8,402,541, 2013 - Google Patents
Int. Cl. Malware detection systems and methods for determining G06F2L/00(2006.01)
whether a collection of data not expected to include execut (52) US Cl................. 726/23 …
whether a collection of data not expected to include execut (52) US Cl................. 726/23 …
Detection of code-based malware
This document describes techniques for detection of code-based malware. According to
some embodiments, the techniques utilize a collection of known malicious code and know …
some embodiments, the techniques utilize a collection of known malicious code and know …
Memory leak detection
O Otenko - US Patent 8,522,216, 2013 - Google Patents
(57) ABSTRACT US PATENT DOCUMENTS Embodiments of the invention provide systems
and methods 6,393,439 B1 5, 2002 Houldsworth et al. for detecting an analyzing memory …
and methods 6,393,439 B1 5, 2002 Houldsworth et al. for detecting an analyzing memory …
Execution of multiple execution paths
G06F II/00(2006.01) G06F II/36(2006.01)(57) ABSTRACT G06F 2/56(2013.01) Techniques
for execution of multiple execution paths are (52) US Cl. described. In one or more …
for execution of multiple execution paths are (52) US Cl. described. In one or more …