×

Tracking of software executables that come from untrusted locations

  • US 10,389,743 B1
  • Filed: 12/22/2016
  • Issued: 08/20/2019
  • Est. Priority Date: 12/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computing device for use in a computing system, the computing device comprising:

  • a network interface configured to receive files via a network;

    an input/output interface configured to access files on a storage device; and

    a processing unit comprising circuitry configured to;

    determine content is untrusted in response to finding identification of the content in a watchlist of untrusted content, wherein the watchlist of untrusted content comprises an identification of untrusted files and processes;

    determine a process that is trusted touches a first file that is untrusted;

    mark the process as being untrusted, responsive to the process touching the first file;

    determine the process subsequently touches a second file not marked as untrusted; and

    mark the second file as untrusted, responsive to determining the second file is touched by the process, wherein marking the second file as untrusted comprises inserting an identification of the second file as a node in the watchlist and an identification of the process as an edge of the node in the watchlist, wherein the identification of the process associates the first file with the second file.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×