Patents by Inventor Prasad DABAK

Prasad DABAK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11580217
    Abstract: Example methods are provided for virtual machine introspection in which a guest monitoring mode (GMM) module monitors the execution of guest calls by an agent that resides in a virtual machine (VM). The GMM module sets a bit in bit mask that corresponds to a guest call that the agent needs to execute, and inserts an invisible breakpoint in the code of the guest call. If the GMM module detects that despite the setting of the bit in the bit mask, the agent does not complete the execution of the code (due to the invisible breakpoint not being triggered), then the GMM module considers this condition as a potential hijack of the VM by malicious code.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: February 14, 2023
    Assignee: VMWARE, INC.
    Inventor: Prasad Dabak
  • Patent number: 11385918
    Abstract: A method is provided for a hypervisor to dynamically discover internal address information of a guest kernel on a virtual machine. The method includes locating a kernel exported system call or function in an image of the guest kernel in guest memory of the virtual machine, disassembling machine code of the kernel exported system call or function in the image into assembly code, detecting a pattern from memory references in the assembly code, and, after detecting the pattern, determining the internal address information of the guest kernel from the assembly code.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: July 12, 2022
    Assignee: VMWARE, INC.
    Inventor: Prasad Dabak
  • Publication number: 20210124825
    Abstract: Example methods are provided for virtual machine introspection in which a guest monitoring mode (GMM) module monitors the execution of guest calls by an agent that resides in a virtual machine (VM). The GMM module sets a bit in bit mask that corresponds to a guest call that the agent needs to execute, and inserts an invisible breakpoint in the code of the guest call. If the GMM module detects that despite the setting of the bit in the bit mask, the agent does not complete the execution of the code (due to the invisible breakpoint not being triggered), then the GMM module considers this condition as a potential hijack of the VM by malicious code.
    Type: Application
    Filed: February 12, 2020
    Publication date: April 29, 2021
    Inventor: Prasad DABAK
  • Patent number: 10860393
    Abstract: A method is provided for a kernel driver in an operating system to detect loading of images into memory and unloading of the images from memory. The method includes registering a callback routine for load-image notifications, receiving a load-image notification for an image and recording loading of the image, storing original code at or about an entry point of the image, and patching redirect stub code over the original code at or about the entry point. The method also includes receiving, from the redirect stub code, a redirected call to or about the entry point to execute a routine in the image. The redirected call identifies a driver object representing the image. The method further includes, based on the driver object, providing a mechanism to intercept unloading of the image and recording the unloading of the image.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: December 8, 2020
    Assignee: NICIRA, INC.
    Inventors: Prasad Dabak, Leena Soman, Goresh Musalay
  • Publication number: 20200233686
    Abstract: A method is provided to for a hypervisor to dynamically discover internal address information of a guest kernel on a virtual machine. The method includes locating a kernel exported system call or function in an image of the guest kernel in guest memory of the virtual machine, disassembling machine code of the kernel exported system call or function in the image into assembly code, detecting a pattern from memory references in the assembly code, and, after detecting the pattern, determining the internal address information of the guest kernel from the assembly code.
    Type: Application
    Filed: April 29, 2019
    Publication date: July 23, 2020
    Inventor: PRASAD DABAK
  • Patent number: 10713357
    Abstract: The subject matter described herein provides protection against zero-day attacks by detecting, via a hypervisor maintaining an extended page table, an attempt to execute arbitrary code associated with malware in a guest operation system (OS) running within a virtual machine (VM). Further, the subject matter provides detection of lateral movement of the malware. The hypervisor uses hidden breakpoints to detect a request for thread creation, and then determines whether the request is to download and execute arbitrary code.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: July 14, 2020
    Assignee: NICIRA, INC.
    Inventor: Prasad Dabak
  • Patent number: 10678922
    Abstract: The subject matter described herein provides protection against zero-day attacks by detecting, via a hypervisor maintaining an extended page table, an attempt to execute arbitrary code associated with malware in a guest operation system (OS) running within a virtual machine (VM). Further, the subject matter provides detection of lateral movement of the malware. The hypervisor uses hidden breakpoints to detect a request for thread creation, and then determines whether the request is to download and execute arbitrary code.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: June 9, 2020
    Assignee: NICIRA, INC.
    Inventor: Prasad Dabak
  • Patent number: 10620985
    Abstract: An example method of managing guest code in a virtualized computing instance of a virtualized computing system includes: receiving, at a hypervisor that manages the virtualized computing instance, identifiers for a first guest-physical memory page, which stores a patched version of the guest code, and a second guest-physical memory page, which stores an original version of the guest code; modifying an entry in a nested page table (NPT), which is associated with the first guest-physical memory page, to cause an exception to the hypervisor in response to a first read operation, performed by first software in the virtualized computing instance, which targets the first guest-physical memory page; and executing, at the hypervisor in response to the exception, a second read operation that emulates the first read operation, but targets the second guest-physical memory page.
    Type: Grant
    Filed: July 7, 2017
    Date of Patent: April 14, 2020
    Assignee: Nicira, Inc.
    Inventors: Prasad Dabak, Achindra Bhatnagar
  • Patent number: 10514945
    Abstract: A hypervisor monitors for an initialization of a guest kernel running on a virtual machine implemented by the hypervisor. When the initialization of the guest kernel is detected, the hypervisor pauses a virtual processor of the virtual machine, locates a guest kernel image of the guest kernel in guest memory, locates a kernel function in the guest kernel image, inserts a breakpoint on the guest kernel function, resumes the virtual processor and monitors for a breakpoint instruction. After detecting the breakpoint instruction, the hypervisor gathers guest context by examining the guest memory and guest registers, pauses the virtual processor, constructs and injects a code gadget configured to run in the virtual machine, diverts the virtual processor to execute the code gadget, which causes the virtual processor to call the hypervisor at the end of executing the code gadget, and returns the virtual processor to execute the guest kernel function.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: December 24, 2019
    Assignee: NICIRA, INC.
    Inventor: Prasad Dabak
  • Patent number: 10489185
    Abstract: Example methods are provided for locating an operating system (OS) data structure on a host according to a hypervisor-assisted approach. The method may comprise a virtualized computing instance identifying a guest virtual memory address range in which the OS data structure is stored; and configuring the hypervisor to perform a safe read on the guest virtual memory address range to access data stored within the guest virtual memory address range. The method may further comprise the virtualized computing instance performing attribute matching by comparing the data stored within the guest virtual memory address range with attribute data associated with the OS data structure; and determining a location associated with the OS data structure based on the attribute matching.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: November 26, 2019
    Assignee: NICIRA, INC.
    Inventors: Prasad Dabak, Goresh Musalay
  • Publication number: 20190278636
    Abstract: A method is provided for a kernel driver in an operating system to detect loading of images into memory and unloading of the images from memory. The method includes registering a callback routine for load-image notifications, receiving a load-image notification for an image and recording loading of the image, storing original code at or about an entry point of the image, and patching redirect stub code over the original code at or about the entry point. The method also includes receiving, from the redirect stub code, a redirected call to or about the entry point to execute a routine in the image. The redirected call identifies a driver object representing the image. The method further includes, based on the driver object, providing a mechanism to intercept unloading of the image and recording the unloading of the image.
    Type: Application
    Filed: December 7, 2017
    Publication date: September 12, 2019
    Inventors: PRASAD DABAK, Leena Soman, Goresh Musalay
  • Publication number: 20190156036
    Abstract: The subject matter described herein provides protection against zero-day attacks by detecting, via a hypervisor maintaining an extended page table, an attempt to execute arbitrary code associated with malware in a guest operation system (OS) running within a virtual machine (VM). Further, the subject matter provides detection of lateral movement of the malware. The hypervisor uses hidden breakpoints to detect a request for thread creation, and then determines whether the request is to download and execute arbitrary code.
    Type: Application
    Filed: February 16, 2018
    Publication date: May 23, 2019
    Inventor: PRASAD DABAK
  • Publication number: 20190156027
    Abstract: The subject matter described herein provides protection against zero-day attacks by detecting, via a hypervisor maintaining an extended page table, an attempt to execute arbitrary code associated with malware in a guest operation system (OS) running within a virtual machine (VM). Further, the subject matter provides detection of lateral movement of the malware. The hypervisor uses hidden breakpoints to detect a request for thread creation, and then determines whether the request is to download and execute arbitrary code.
    Type: Application
    Filed: February 16, 2018
    Publication date: May 23, 2019
    Inventor: PRASAD DABAK
  • Publication number: 20190129741
    Abstract: A hypervisor monitors for an initialization of a guest kernel running on a virtual machine implemented by the hypervisor. When the initialization of the guest kernel is detected, the hypervisor pauses a virtual processor of the virtual machine, locates a guest kernel image of the guest kernel in guest memory, locates a kernel function in the guest kernel image, inserts a breakpoint on the guest kernel function, resumes the virtual processor and monitors for a breakpoint instruction. After detecting the breakpoint instruction, the hypervisor gathers guest context by examining the guest memory and guest registers, pauses the virtual processor, constructs and injects a code gadget configured to run in the virtual machine, diverts the virtual processor to execute the code gadget, which causes the virtual processor to call the hypervisor at the end of executing the code gadget, and returns the virtual processor to execute the guest kernel function.
    Type: Application
    Filed: February 7, 2018
    Publication date: May 2, 2019
    Inventor: Prasad Dabak
  • Patent number: 10277717
    Abstract: According to examples of the present disclosure, a method is provided to perform network introspection in an operating system that comprises a user memory space and a kernel memory space. The method may comprise, in response to an initiation of a socket operation, filtering the socket operation at a socket layer in the kernel memory space using a socket operation filter hook associated with the socket operation. The method may further comprise performing an introspection action associated with the socket operation filtered using the socket operation filter hook.
    Type: Grant
    Filed: December 15, 2013
    Date of Patent: April 30, 2019
    Assignee: NICIRA, INC.
    Inventors: Gaurav Sharma, Prasad Dabak
  • Publication number: 20180307516
    Abstract: An example method of managing guest code in a virtualized computing instance of a virtualized computing system includes: receiving, at a hypervisor that manages the virtualized computing instance, identifiers for a first guest-physical memory page, which stores a patched version of the guest code, and a second guest-physical memory page, which stores an original version of the guest code; modifying an entry in a nested page table (NPT), which is associated with the first guest-physical memory page, to cause an exception to the hypervisor in response to a first read operation, performed by first software in the virtualized computing instance, which targets the first guest-physical memory page; and executing, at the hypervisor in response to the exception, a second read operation that emulates the first read operation, but targets the second guest-physical memory page.
    Type: Application
    Filed: July 7, 2017
    Publication date: October 25, 2018
    Inventors: PRASAD DABAK, Achindra Bhatnagar
  • Publication number: 20180267818
    Abstract: Example methods are provided for locating an operating system (OS) data structure on a host according to a hypervisor-assisted approach. The method may comprise a virtualized computing instance identifying a guest virtual memory address range in which the OS data structure is stored; and configuring a hypervisor to generate notification data associated with the guest virtual memory address range. The method may further comprise the virtualized computing instance manipulating the OS data structure; obtaining notification data generated by the hypervisor in response to the manipulation; and determining a location associated with the OS data structure based on the notification data.
    Type: Application
    Filed: June 8, 2017
    Publication date: September 20, 2018
    Inventors: PRASAD DABAK, GORESH MUSALAY
  • Publication number: 20180267819
    Abstract: Example methods are provided for locating an operating system (OS) data structure on a host according to a hypervisor-assisted approach. The method may comprise a virtualized computing instance identifying a guest virtual memory address range in which the OS data structure is stored; and configuring the hypervisor to perform a safe read on the guest virtual memory address range to access data stored within the guest virtual memory address range. The method may further comprise the virtualized computing instance performing attribute matching by comparing the data stored within the guest virtual memory address range with attribute data associated with the OS data structure; and determining a location associated with the OS data structure based on the attribute matching.
    Type: Application
    Filed: June 8, 2017
    Publication date: September 20, 2018
    Inventors: PRASAD DABAK, Goresh Musalay
  • Patent number: 9531547
    Abstract: Examples perform external verification of authenticity of software components loaded onto virtual machines (VM). A processor, external to the VM, reads the loaded software component from the VM, and restores the loaded software component to its disk image state by undoing any changes made to load the software component. The digital signature is read from the restored disk image of the software and compared to the verified digital signature of the publisher of the software component. Some examples contemplate marking the software component as verified or unverified, and preventing unverified software components from making global changes.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: December 27, 2016
    Assignee: VMware, Inc.
    Inventors: Prasad Dabak, Alok Nemchand Kataria
  • Publication number: 20160294559
    Abstract: Examples perform external verification of authenticity of software components loaded onto virtual machines (VM). A processor, external to the VM, reads the loaded software component from the VM, and restores the loaded software component to its disk image state by undoing any changes made to load the software component. The digital signature is read from the restored disk image of the software and compared to the verified digital signature of the publisher of the software component. Some examples contemplate marking the software component as verified or unverified, and preventing unverified software components from making global changes.
    Type: Application
    Filed: June 25, 2015
    Publication date: October 6, 2016
    Inventors: Prasad Dabak, Alok Nemchand Kataria