×

Exploit detection system

  • US 10,148,693 B2
  • Filed: 06/15/2015
  • Issued: 12/04/2018
  • Est. Priority Date: 03/25/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • one or more hardware processors; and

    a storage module communicatively coupled to the one or more hardware processors, the storage module comprising logic that, upon execution by the one or more hardware processors, performs operations comprising;

    providing, by a first virtual machine, identifying information corresponding to an object to a security virtual machine for analysis of the object, the first virtual machine being one of a plurality of virtual machines and the first virtual machine being different than the security virtual machine;

    performing, by the security virtual machine, a pre-processing based on the identifying information to determine whether the object is malicious;

    responsive to the pre-processing resulting in a determination of suspicious, potentially suspicious or non-malicious, processing the object in the first virtual machine;

    upon detection within the first virtual machine of a triggering event, providing, by the first virtual machine, information associated with the triggering event to the security virtual machine, wherein the detection occurs during the processing of the object in the first virtual machine; and

    determining, within the security virtual machine, whether the object is malicious based upon an analysis of the information associated with the triggering event using one or more correlation rules, wherein a hypervisor coordinates communication between the security virtual machine and the plurality of virtual machines to prevent comingling of data between the plurality of virtual machines, and wherein the information associated with the triggering event is different than the identifying information.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×