×

Detecting unknown software vulnerabilities and system compromises

  • US 10,032,031 B1
  • Filed: 08/27/2015
  • Issued: 07/24/2018
  • Est. Priority Date: 08/27/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • during a learning period, recording in a memory of at least one of one or more computing devices, an indication of which of a plurality of portions of an imported software package are invoked by a service during execution of the service in the learning period, individual ones of the plurality of portions selected from at least one of;

    a class, a function, a file, or a library;

    determining, via at least one monitoring service executed by at least one of the one or more computing devices, that a different portion of the imported software package is invoked by the service subsequent to the learning period, the different portion being different than those invoked by the service during the learning period;

    blocking, via the at least one monitoring service executed by at least one of the one or more computing devices, execution of the different portion of the imported software package in response to determining that the different portion of the imported software package is invoked by the service; and

    causing a re-initiation of the learning period for the imported software package, via at least one of the one or more computing devices, the re-initiation of the learning period updating, in the memory, the indication of the plurality of portions of the imported software package invoked by the service, in response to at least one of;

    determining, via at least one of the one or more computing devices, that the service has changed;

    determining, via at least one of the one or more computing devices, that the imported software package has changed;

    ordetermining, via at least one of the one or more computing devices, that a customer of the service has changed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×