Invention Grant
US08352522B1 Detection of file modifications performed by malicious codes 有权
检测恶意代码执行的文件修改

Detection of file modifications performed by malicious codes
Abstract:
File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on the original file. In response to detecting the file modification, a corresponding shadow file is created. The shadow file represents the original file as modified by the file modification. Before allowing the file modification to be performed on the original file, the original file is compared to the shadow file to determine if the file modification is being performed by malicious codes. The file modification may be deemed to be performed by malicious codes when the file modification involves, for example, entry point append, entry point prepend, entry point obfuscation, cavity, overwriting, or mal-tattoo.
Information query
Patent Agency Ranking
0/0