Protection Of Code Or Data From Exposure By Use Of Code Injection Service

  • Published: Feb 7, 2012
  • Earliest Priority: Nov 06 2007
  • Family: 1
  • Cited Works: 1
  • Cited by: 7
  • Cites: 15
  • Additional Info: Full text

A method for operating a binary executable in which some of the data or code is to be protected includes the step of pruning the binary executable of the code andor data to be protected. Nonfunctional code is substituted for the code pruned from the binary executable, to form a pruned executable which does not contain the code to be protected. The code pruned from the binary executable is loaded into a code injection service or program (CIS). The binary executable is placed in memory as with any application. Invoking the pruned executable alone results in crash. The CIS is made part of the operating system service, and is loaded into RAM when the computer starts. When the pruned executable is invoked, the CIS detects its presence, and as the pruned executable runs, the CIS substitutes the actual data or code into the pruned executable, whereby it operates normally.

Download PDF
Document Preview
Document History
  • Publication: Feb 7, 2012
  • Application: Nov 6, 2007
    US US 93551107 A
  • Priority: Nov 6, 2007
    US US 93551107 A

Download Citation

Sign in to the Lens