Systems and methods for verifying trust of executable files
First Claim
Patent Images
1. A computer-implemented method comprising:
- determining that an executable file is being introduced into a path of execution; and
responsive to the determining, automatically evaluating the executable file with multiple malware checks to detect if the executable file represents a type of malware, the multiple malware checks being integrated into an operating system trust verification process along the path of execution.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple malware checks to detect if the executable file represents a type of malware. The multiple malware checks are integrated into an operating system trust verification process along the path of execution.
79 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
determining that an executable file is being introduced into a path of execution; and
responsive to the determining, automatically evaluating the executable file with multiple malware checks to detect if the executable file represents a type of malware, the multiple malware checks being integrated into an operating system trust verification process along the path of execution. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium comprising computer-program instructions executable by a processor for:
-
determining that an executable file is being introduced into a path of execution; and
responsive to the determining, automatically evaluating the executable file with multiple malware checks to detect if the executable file represents a type of malware, the multiple malware checks being integrated into an operating system trust verification process along the path of execution. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a processor; and
a memory coupled to the processor, the memory comprising computer-program instructions executable by the processor for;
determining that an executable file is being introduced into a path of execution; and
responsive to the determining, automatically evaluating the executable file with multiple malware checks to detect if the executable file represents a type of malware, the multiple malware checks being integrated into an operating system trust verification process along the path of execution. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification