Methods and apparatus for application isolation
First Claim
1. An apparatus, comprising:
- a memory; and
a hardware processor communicatively coupled to the memory, the hardware processor configured to execute a virtual machine monitor at least partially stored in the memory, the virtual machine monitor configured to provide a first level of virtualization,the hardware processor configured to execute, using the virtual machine monitor, a plurality of virtual environments to provide a second level of virtualization, the second level of virtualization operating within the first level of virtualization,each virtual environment from the plurality of virtual environments configured to execute an application from a plurality of applications, the plurality of virtual environments configured to isolate each application from the plurality of applications from the remaining applications from the plurality of applications,the hardware processor configured to monitor behavior of the application within a virtual environment from the plurality of virtual environments to detect unauthorized activity of the application within the virtual environment,the hardware processor configured to discard the virtual environment in response to detecting the unauthorized activity of the application within the virtual environment.
3 Assignments
0 Petitions
Accused Products
Abstract
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.
179 Citations
20 Claims
-
1. An apparatus, comprising:
-
a memory; and a hardware processor communicatively coupled to the memory, the hardware processor configured to execute a virtual machine monitor at least partially stored in the memory, the virtual machine monitor configured to provide a first level of virtualization, the hardware processor configured to execute, using the virtual machine monitor, a plurality of virtual environments to provide a second level of virtualization, the second level of virtualization operating within the first level of virtualization, each virtual environment from the plurality of virtual environments configured to execute an application from a plurality of applications, the plurality of virtual environments configured to isolate each application from the plurality of applications from the remaining applications from the plurality of applications, the hardware processor configured to monitor behavior of the application within a virtual environment from the plurality of virtual environments to detect unauthorized activity of the application within the virtual environment, the hardware processor configured to discard the virtual environment in response to detecting the unauthorized activity of the application within the virtual environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code to cause the processor to:
-
execute each application from a plurality of applications within a different virtual environment from a plurality of virtual environments to isolate each application from the plurality of applications from the remaining applications from the plurality of applications, the plurality of virtual environments providing a first level of virtualization within a second level of virtualization; monitor behavior of each application from the plurality of applications to detect unauthorized activity; and discard a virtual environment from the plurality of virtual environments without discarding the remaining virtual environments from the plurality of virtual environments when unauthorized activity of an application within the virtual environment is detected and unauthorized activity of applications within the remaining virtual environments from the plurality of virtual environments is not detected. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
initiating a first virtual environment within which to execute a first application, the first virtual environment isolating the first application from a second application executing within a second virtual environment, the first virtual environment and the second virtual environment providing a first level of virtualization within a second level of virtualization; monitoring behavior of the first application within the first virtual environment; and detecting, based on the monitoring, an unauthorized activity of the first application, the unauthorized activity including at least one of an unauthorized change to a non-modifiable section of the first virtual environment, a registry write, a start of a new process, corruption to an existing process, a web site visited, a redirected Uniform Resource Locator (URL), an infection detail, an event timeline, a network connection, a file system write, or a configuration change. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification