This invention relates to a method for operating a computing device, and in particular to an improved method of scanning for malicious software in a computing device.
In the context of the present invention, the term ‘computing device’ includes, without limitation, Desktop and Laptop computers, Personal Digital Assistants (PDAs), Mobile Telephones, Smartphones, Digital Cameras and Digital Music Players. It also includes converged devices incorporating the functionality of one or more of the classes of device already mentioned, together with many other industrial and domestic electronic appliances.
There is now widespread public awareness that there is a significant risk for malicious programs (or malware) to affect computing devices, especially when the computing device is connected to other devices over a network. It is common for all instances of such malware to be generically termed a virus. However, security experts distinguish between many different types of malware. A recent Internet article (http://en.wikipedia.org/wiki/Malware) identifies and describes eleven different types, which include Viruses, Worms, Wabbits, Trojans, Backdoors, Spyware, Exploits, Rootkits, Key Loggers, Dialers and Browser Hijackers.
Malware can gain entry to a computing device in different ways. Many infections arise as a result of the user of a device being tricked into installing software that carries the infection. This route into the device can be relatively easily monitored by means of certification, authentication and verification of installable software packages and other code items such as macros. However, users do not always heed warnings given at the installation phase about the dangers of untrusted software. Additionally, malware is not restricted to installable executables and can spread through other means such as emails and email attachments.
For this reason, computing devices are increasingly being equipped with anti-virus software. Such software has traditionally worked by hooking into the file system of the host operating system, and scanning files as they are written to or read from disk. During this scan, they search for a unique series of bytes that can be used as a signature or fingerprint to identify malware. Most personal computer users are aware that they need to maintain the virus definition files for this type of software up to date if the method is to be effective.
Because the process of scanning on-the-fly is fallible (for instance, it cannot detect potential malware infections on removable media) most types of anti-virus software are often run periodically in a deeper batch mode, during which the full contents of the entire file system is analysed looking for the fingerprints referred to above.
However, anti-virus software which scans only the file system cannot catch all malware. It is known that there are other ways apart from the file system through which devices can be infected; security holes which can be exploited by malware to allow its code to be executed on a computing device are known to be found on a regular basis, either in the operating system that controls the computing device, or in software packages which it commonly uses.
An article at http://en.wikipedia.org/wiki/Exploit_(computer_science) lists a number of such exploits, including buffer overflow, integer overflow, memory corruption, format string attacks, race condition, cross-site scripting, cross-site request forgery and SQL injection bugs. Malware entering a device via many of these routes might reside entirely in memory, and not be detectable via scanning the file system. An example of this type of malware would be a so-called worm that propagates from the memory of one machine to the memory of another by exploiting vulnerabilities in communication stacks.
For this reason, anti-virus software generally checks the contents of volatile memory (RAM) as well as the contents of the file system, in order to look for signatures of the various types of memory resident malware.
It should be noted that all computing devices are potentially subject to malware attacks, not simply desktop and laptop computers. Security loopholes have been exploited on other computing devices, including battery-powered mobile devices. In particular, it is apparent that for mobile computing devices such as smartphones, which remain either powered up or on standby for long periods of time and often use non-volatile flash memory technologies, memory based malware such as worms are clearly much more dangerous than they would be on mains-powered computers that employ volatile dynamic RAM and can rely on being regularly powered down to clear out memory-resident malware.
Current anti-virus software depends heavily on scanning file systems. However, there are problems with existing methods used for this purpose:
As mentioned above, because it has been recognised that the scanning of file systems alone cannot detect memory malware, current anti-virus software usually also scans the device memory. However, existing methods of scanning memory also have drawbacks:
While keeping the same detailed methodology of scanning for the signature or fingerprints of malware, this invention discloses how a computer device can be arranged to implement a system for detecting and defeating malicious code infections in a way that is more efficient as well as more robust than existing anti-virus software scanning solutions.
According to a first aspect of the present invention there is provided a method of operating a computing device wherein the device is protected from executable malware by
According to a second aspect of the present invention there is provided a computing device arranged to operate in accordance with the method of the first aspect.
According to a third aspect of the present invention there is provided an operating system for causing a computing device to operate in accordance with the method of the first aspect.
Embodiments of the present invention will now be described, by way of further example only, with reference to the accompanying drawings in which;
The perception behind this invention is that executable code stored on disk is in itself virtually harmless. Even when that code is loaded into memory, it still does no harm. It is only when the code is executed that it is given a chance to do harm. Therefore, provided a method can be found of identifying code that is about to be executed, it is quite possible to completely dispense with scanning the entire contents of memory, scanning filesystem reads and writes, and deep scans of the entire filesystem in the search for malware. By identifying code that is about to be executed, the scanning process can be made more efficient.
The basis of implementing the present invention is for the computing device to use a central processing unit (CPU) that can differentiate between those portions of memory that contain executable code and those that merely contain data, and for the anti-virus software in that computing device to be provided with a mechanism by which it is notified when there is a change in the contents of a portion of memory that contains code.
Suitable processors include those that conform with ARM Architecture version 6 (ARMv6) as designed by ARM pic of Cambridge, England, together with those that conform with Intel IA-32 designed by Intel Corporation of Santa Clara, Calif., USA. In common with many other processors that incorporate memory management functionality, these CPUs divide accessible memory up into pages. However, as disclosed at http://www.arm.com/pdfs/ARMv6_Architecture.pdf and at http://cache-www.intel.com/cd/00/00/14/93/149307—149307.pdf, pages may be marked as non-executable, in which case they cannot be used for executing code. The ARM architecture achieves this by setting an XN bit for each page of memory, where XN stands for Execute Never, while Intel achieve the marking of memory pages by setting an Execute Disable bit.
It should be noted that while Intel disclose that the Execute Disable bit is provided to stop malware from executing code in data pages, this is clearly aimed at preventing attacks by malware exploits such as stack and buffer overflows, there is no hint whatsoever in the Intel disclosure of the use of such a mechanism to improve the efficiency of and lessen the power wastage inherent in virus scanning operations, as is disclosed in the present invention.
One implementation of this invention is shown in
However, a further implementation of this invention is to provide a mechanism for notifying the anti-virus software either directly or via the operating system when the contents of one of the executable pages of memory changes; this enables rescanning of memory to take place only when necessary and the need for complete memory scans is thereby minimised.
There are a number of ways in which this notification mechanism may be implemented. Two (non exclusive) suggested methods are as follows:
For most existing software on most computing devices, the program loader is the only entity that needs to be modified to use the above APIs. Any attempt to bypass the program loader would inevitably fail, as such attempts would be trying to execute code from a non-executable page.
The responsive mode may be implemented by setting up special exception handlers within the memory manager which can trigger an interrupt when any attempt is made to modify the contents of an executable page; the mechanism suggested will be familiar to those skilled in the art as it is analogous to that of a page fault. However, other methods of notification are possible and it is not intended that the present invention be limited by the mechanism suggested.
The implementations described above are provided for illustrative purposes only and it is not intended that the present invention be limited only to the particular implementations. The present invention can be implemented in many ways and on many different operating systems and on many different computing devices without departing from the scope of the invention disclosed herein.
It can be seen from the above description that several advantages accrue through the use of the present invention
Although the present invention has been described with reference to particular embodiments, it will be appreciated that modifications may be effected whilst remaining within the scope of the present invention as defined by the appended claims.
| Number | Date | Country | Kind |
|---|---|---|---|
| 0525871.0 | Dec 2005 | GB | national |
| Filing Document | Filing Date | Country | Kind | 371c Date |
|---|---|---|---|---|
| PCT/GB2006/004821 | 12/20/2006 | WO | 00 | 2/27/2009 |