Systems and methods for identifying sources of malware
First Claim
Patent Images
1. A computer-implemented method of managing malware, comprising:
- detecting malware on a protected computer;
collecting information from a history log of the protected computer; and
directing the protected computer to convey the information to a host computer, such that the information can be used to identify a source of the malware.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for identifying sources of malware are described. In one embodiment, a system includes a malware detection module configured to determine that a protected computer includes malware. The system also includes a history log module configured to access a history log of the protected computer to identify a set of potential sources of the malware.
401 Citations
17 Claims
-
1. A computer-implemented method of managing malware, comprising:
-
detecting malware on a protected computer;
collecting information from a history log of the protected computer; and
directing the protected computer to convey the information to a host computer, such that the information can be used to identify a source of the malware. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium comprising executable instructions to:
-
detect a presence of malware that is downloaded using a Web browser;
access the Web browser'"'"'s history log to identify a set of Web sites; and
report that the set of Web sites include a potential malware distribution site. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system of managing malware, comprising:
-
a malware detection module configured to determine that a protected computer includes malware; and
a history log module configured to access a history log of the protected computer to identify a set of potential sources of the malware. - View Dependent Claims (14, 15, 16, 17)
-
Specification