Log in
Enquire now
‌

US Patent 10284591 Detecting and preventing execution of software exploits

Patent 10284591 was granted and assigned to Webroot on May, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Patent abstractTimelineTable: Further ResourcesReferences
Is a
Patent
Patent

Patent attributes

Patent Applicant
Webroot
Webroot
Current Assignee
Webroot
Webroot
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
10284591
Patent Inventor Names
Marco Giuliani45
Benedetto Voltattorni45
Johannes Mayr45
Marco Bizzarri45
Date of Patent
May 7, 2019
Patent Application Number
14606604
Date Filed
January 27, 2015
Patent Citations Received
‌
US Patent 12130923 Methods and apparatus for augmenting training data using large language models
1
‌
US Patent 11997139 Deceiving attackers accessing network data
2
‌
US Patent 11995205 Centralized event detection
3
‌
US Patent 12026257 Method of malware detection and system thereof
4
Loading...
5
‌
US Patent 12079757 Endpoint with remotely programmable data recorder
6
‌
US Patent 12093383 Tracking malware root causes with an event graph
7
‌
US Patent 11507663 Method of remediating operations performed by a program and system thereof
...
Patent Primary Examiner
‌
Joseph P Hirl
Patent abstract

In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10284591 Detecting and preventing execution of software exploits

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.