The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 08, 2019

Filed:

Aug. 11, 2015
Applicant:

Symantec Corporation, Mountain View, CA (US);

Inventors:

Joseph Chen, Los Angeles, CA (US);

Rei Kristian Resurreccion, Mountain View, CA (US);

Assignee:

Symantec Corporation, Mountain View, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06F 21/54 (2013.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 21/54 (2013.01); G06F 21/552 (2013.01); G06F 21/566 (2013.01); G06F 21/568 (2013.01); H04L 63/1433 (2013.01); G06F 2221/033 (2013.01); G06F 2221/034 (2013.01); G06F 2221/2149 (2013.01);
Abstract

The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that facilitates execution of a computing process by logging telemetry data related to the computing process while the computing process is running within the computing environment, (2) determining that the computing process crashed while running within the computing environment, (3) searching the telemetry data for evidence of any vulnerabilities that potentially led the computing process to crash while running within the computing environment, (4) identifying, while searching the telemetry data, evidence of at least one vulnerability of the computing process that is not yet known to exist within the computing process and then in response to identifying the evidence of the computing process's vulnerability, (5) performing at least one security action to hinder any potentially malicious exploitation of the computing process's vulnerability. Various other methods, systems, and computer-readable media are also disclosed.


Find Patent Forward Citations

Loading…