ANALYZING EXECUTABLE BINARY CODE WITHOUT DETECTION

Number of patents in Portfolio can not be more than 2000

United States of America Patent

APP PUB NO 20130347104A1
SERIAL NO

13764332

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Analysis of executable binary code is performed without detection by defensive elements embedded within the executable binary code or within a system in which the executable binary code is executing. An identified suspect executable file is disassembled. Statically and dynamically analysis is performed on binary code of the disassembled executable file. An anti-anti-debugging function is implemented by executing program call functions in a manner which avoids detection of a debugging program by the defensive elements embedded within the executable binary code of the anti-debugging function of the executable binary code, thereby avoiding detection by the source of the suspect executable file.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
RIVERSIDE RESEARCH INSTITUTE156 WILLIAM STREET 9TH FLOOR NEW YORK NY 10038

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
BRYANT, Adam New York, US 2 86
CHEATHAM, Jason New York, US 1 16
CHEATHAM, Michelle New York, US 1 16
KRUMHEUER, Brian New York, US 1 16
RABER, Jason New York, US 1 16
SHINKLE, Ronald New York, US 1 16

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation