Software object corruption detection

U Mann, N Doshi - US Patent 8,307,435, 2012 - Google Patents
The execution of a software application is diverted to detect software object corruption in the
software application. Software objects used by the software application are identified and …

Shellcode detection

E Thioux - US Patent 9,973,531, 2018 - Google Patents
According to one embodiment, a threat detection system is integrated with at least a dynamic
analysis engine. The dynamic analysis engine is configured to automatically determine …

Computer exploit detection using heap spray pattern matching

E Thioux, S Vashisht, M Vincent - US Patent 9,438,623, 2016 - Google Patents
See application file for complete search history. region of allocated memory, and detect a
second pattern at one or more storage locations Subsequent to the first storage location with …

Ransomware detection and mitigation

J Singh, A Gupta - US Patent 10,503,904, 2019 - Google Patents
A computerized method for detecting and mitigating a ransomware attack is described. The
method features (i) a kernel mode agent that intercepts an initiation of a process, intercepts …

Control flow graph representation and classification

E Aktas, R Mathur - US Patent 9,438,620, 2016 - Google Patents
A software sample is identified that includes code and a control flow graph is generated for
each of a plurality of functions included in the sample. Features are identified in each of the …

Methods of identifying heap spray attacks using memory anomaly detection

S Paithane, SO Vashisht - US Patent 10,430,586, 2019 - Google Patents
A non-transitory storage medium including instructions that are executable by one or more
processors to perform operations including instrumenting a VM is shown. The VM is used to …

Proactive exploit detection

C Craioveanu, Y Lin, P Ferrie, B Dang - US Patent 8,402,541, 2013 - Google Patents
Int. Cl. Malware detection systems and methods for determining G06F2L/00(2006.01)
whether a collection of data not expected to include execut (52) US Cl................. 726/23 …

Detection of code-based malware

BG Zorn, B Livshits, CM Curtsinger, C Seifert - US Patent 8,713,679, 2014 - Google Patents
This document describes techniques for detection of code-based malware. According to
some embodiments, the techniques utilize a collection of known malicious code and know …

Memory leak detection

O Otenko - US Patent 8,522,216, 2013 - Google Patents
(57) ABSTRACT US PATENT DOCUMENTS Embodiments of the invention provide systems
and methods 6,393,439 B1 5, 2002 Houldsworth et al. for detecting an analyzing memory …

Execution of multiple execution paths

B Livshits, BG Zorn, C Seifert, C Kolbitsch - US Patent 9,038,185, 2015 - Google Patents
G06F II/00(2006.01) G06F II/36(2006.01)(57) ABSTRACT G06F 2/56(2013.01) Techniques
for execution of multiple execution paths are (52) US Cl. described. In one or more …