Data streams are scanned to detect malicious jump-call-pop shellcode constructs used in attacks against stack-based buffer overflow vulnerabilities on software executing in the IA32 architecture prior to execution. Upon a detection of a malicious jump-call-pop shellcode construct, protective action is taken, such as preventing the malicious shellcode from executing.

 
Web www.patentalert.com

< Method and device for sharing of content protected by digital rights management

> Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network

> Method and system for detecting characteristics of a wireless network

~ 00574