Method of detecting malicious code

Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S188000, C726S024000

Reexamination Certificate

active

07131036

ABSTRACT:
Malicious code in a code-executing device is detected by generating test data, which is substantially unsusceptible to compression without reducing its information content, and storing it as image data in memory external to the device. The test data is stored into memory of the device. A checksum calculation is performed on the test data stored in the memory of the device to generate a first checksum value. A corresponding checksum calculation is performed on the image data to generate a second checksum value. The first value is compared with the second value to determine whether or not the test data in the memory of the device has been corrupted. These steps are repeated until sufficient test data in the memory of the device is checksum tested to determine whether or not malicious code is present in the device. The malicious code is difficult to conceal itself from the checksums. Hence, it is possible to determine whether or not the device has been compromised.

REFERENCES:
patent: 5050212 (1991-09-01), Dyson
patent: 5454000 (1995-09-01), Dorfman
patent: 5475625 (1995-12-01), Glaschick
patent: 5493649 (1996-02-01), Slivka et al.
patent: 5598530 (1997-01-01), Nagae
patent: 5608801 (1997-03-01), Aiello et al.
patent: 5613002 (1997-03-01), Kephart et al.
patent: 5881151 (1999-03-01), Yamamoto
patent: 5915017 (1999-06-01), Sung et al.
patent: 0 848 316 (1997-12-01), None
patent: 1 056 010 (1999-05-01), None
System For Detecting Undesired Alteration Of Software, IBM Technical Disclosure Bulletin, IBM Corp., New York, vol. 32, No.11, Apr. 1, 1990, pp. 48-50.
Protection Against EEPROM Modification Attacks, W. W. Fung, et al.,Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong, pp. 250-260.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of detecting malicious code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of detecting malicious code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of detecting malicious code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3717968

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.