18435380. VULNERABILITY ANALYSIS OF A COMPUTER DRIVER simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

VULNERABILITY ANALYSIS OF A COMPUTER DRIVER

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Raghav Pande of Bellevue WA (US)

Jordan Josef Geurten of Redmond WA (US)

Danut Antoche-albisor of Sammamish WA (US)

VULNERABILITY ANALYSIS OF A COMPUTER DRIVER - A simplified explanation of the abstract

This abstract first appeared for US patent application 18435380 titled 'VULNERABILITY ANALYSIS OF A COMPUTER DRIVER

The patent application describes methods, systems, and computer programs for analyzing a program to detect vulnerabilities for malicious attacks.

  • Dynamic vulnerability detection of a driver when loaded in a computing system.
  • Detection of offsets provided by the driver for access and API calls made by the driver.
  • Static vulnerability detection by analyzing binary code of the driver.
  • Identification of vulnerable code paths to functions accessing kernel functionality.
  • Determination of driver vulnerability based on dynamic and static vulnerability detection results.
    • Potential Applications:**

This technology can be used in cybersecurity to enhance the detection of vulnerabilities in programs and drivers, improving overall system security.

    • Problems Solved:**

This technology addresses the need for more effective methods of detecting vulnerabilities in programs and drivers to prevent malicious attacks and enhance system security.

    • Benefits:**

- Improved detection of vulnerabilities in drivers and programs - Enhanced system security against malicious attacks - Better protection of sensitive data and information

    • Commercial Applications:**

Cybersecurity companies can utilize this technology to offer enhanced vulnerability detection services to businesses and organizations looking to improve their system security.

    • Questions about Vulnerability Detection Technology:**

1. How does dynamic vulnerability detection differ from static vulnerability detection in this technology? 2. What are the key benefits of using this technology for cybersecurity purposes?


Original Abstract Submitted

Methods, systems, and computer programs are presented for analyzing a program to be executed on a computer to detect vulnerability for malicious attacks using the program. One method includes an operation for performing dynamic vulnerability detection of a driver when the driver is loaded in a computing system. The dynamic vulnerability detection comprises detecting at least one offset made available by the driver for access to the driver, and detecting application programming interface (API) calls made by the driver. Further, the method includes performing static vulnerability detection of the driver by analyzing binary code of the driver. The static vulnerability detection comprises determining the at least one offset available for access to the driver, and identifying vulnerable code paths to functions accessing kernel functionality. Further, the method includes an operation for determining if the driver is vulnerable based on results from the dynamic vulnerability detection and the static vulnerability detection.