Unlock instant, AI-driven research and patent intelligence for your innovation.

Detecting software attacks on processes in computing devices

A technology of computing equipment and processes, used in computing, computer security devices, instruments, etc.

Active Publication Date: 2018-05-11
QUALCOMM INC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A heap buffer overflow works similarly to overflowing the heap and causing the execution of malicious code inserted at another location in memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting software attacks on processes in computing devices
  • Detecting software attacks on processes in computing devices
  • Detecting software attacks on processes in computing devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References to specific examples and implementations are for illustrative purposes and are not intended to limit the scope of the written description or the claims.

[0025] As used herein, the term "computing device" refers to any or all of the following: cellular telephones, smart phones, personal or mobile multimedia players, personal data assistants, desktop computers, laptop computers, Tablet computers, servers, smart phones, smart watches, handheld computers, wireless email receivers, multimedia Internet-enabled cellular phones, wireless game controllers, and similar personal or business electronic devices that include programmable processors and memory.

[0026] Computing devices execute various applications and system processes, some of which may have lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Various embodiments include methods for detecting software attacks on a process executing on a computing device. Various embodiment methods may include monitoring structural attributes of a pluralityof virtual memory regions utilized by the process, and comparing the monitored structural attributes to the expected structural attributes of the plurality of VMRs. Various embodiment methods may further include determining whether the monitored structural attributes represent anomalous behavior of the process based on the comparison between the monitored structural attributes and the expected structural attributes.

Description

[0001] related application [0002] This application claims priority to U.S. Provisional Application No. 62 / 219,970, filed September 17, 2015, entitled "Detecting Software Attacks on Processes in Computing Devices," which is incorporated herein by reference in its entirety. Background technique [0003] Various computing devices, including desktop computers, laptop computers, tablet computers, and mobile communication devices such as smart phones, execute application and system processes according to software instructions stored in memory. Certain application processes or system service processes may have high access rights (eg, root access rights) to the computing device. These processes can be targets of control hijacking software designed to take control of privileged processes and execute malicious code. The goal of control hijacking software may be to try to gain a shell or steal private data. [0004] There are several different types of control hijacking software atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06F21/56
CPCG06F21/52G06F21/566G06F21/552G06F21/554
Inventor S·A·K·加塔拉R·古普塔N·伊斯兰
Owner QUALCOMM INC