Techniques are disclosed that exploit system call mechanism to effect robust security applications. In one particular case, security software is able to effectively "sandbox" user mode applications at the thread granularity level, by replacing the system call mechanism of the operating system with a custom mechanism that limits the rights available to a target application that is vulnerable to malicious attack. The techniques allow the security software to create service tables with varying degrees of security levels, and do not impact performance of non-targeted running processes/threads.

 
Web www.patentalert.com

< Receiver unit and method of setting the same

> Methods and apparatus for interface adapter integrated virus protection

> Method and system for performing real-time operation

~ 00591