Patents by Inventor Peter Kosinar

Peter Kosinar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150278522
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: June 10, 2015
    Publication date: October 1, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Publication number: 20150089652
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: December 2, 2014
    Publication date: March 26, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Publication number: 20150089651
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: December 2, 2014
    Publication date: March 26, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Publication number: 20150089650
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: December 2, 2014
    Publication date: March 26, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Publication number: 20150089653
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: December 2, 2014
    Publication date: March 26, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Patent number: 8943592
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: January 27, 2015
    Assignee: ESET, Spol. s.r.o.
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar
  • Publication number: 20150020198
    Abstract: A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions.
    Type: Application
    Filed: July 15, 2013
    Publication date: January 15, 2015
    Inventors: Pawel Mirski, Peter Hlavaty, Peter Kosinar