×

Methods and apparatus for application isolation

  • US 10,187,417 B2
  • Filed: 12/14/2017
  • Issued: 01/22/2019
  • Est. Priority Date: 09/12/2008
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a memory; and

    a hardware processor communicatively coupled to the memory, the hardware processor configured to execute a virtual machine monitor at least partially stored in the memory, the virtual machine monitor configured to provide a first level of virtualization,the hardware processor configured to execute a virtual environment using the virtual machine monitor, the virtual environment configured to provide a second level of virtualization, the second level of virtualization operating within the first level of virtualization,the hardware processor configured to execute an application within the virtual environment, access to data associated with a host operating system by the application being restricted to a shared memory configured to operate within the first level of virtualization,the hardware processor configured to monitor behavior of the application within the virtual environment, the hardware processor configured to discard the virtual environment in response to detecting unauthorized activity of the application, the unauthorized activity including at least one of an unauthorized change to a non-modifiable section of the virtual environment, a registry write, a start of a new process, corruption to an existing process, a web site visited, a redirected Uniform Resource Locator (URL), an infection detail, an event timeline, a network connection, a file system write, or a configuration change.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×