NULLIFICATION OF MALICIOUS CODE BY DATA FILE TRANSFORMATION
First Claim
Patent Images
1. A method of nullifying malicious code potentially contained within a data file received by a computing platform, the method comprising:
- selecting, at random, a transformation to be applied to the received data file from at least two available transformations, each transformation being such as to alter the bit pattern of a file to which it is applied while still enabling manifestation of at least some of the file'"'"'s semantic content to a user, andapplying the selected transformation to the received data file to generate a transformed file.
1 Assignment
0 Petitions
Accused Products
Abstract
To nullify any malicious code potentially contained within a data file. a transformation engine randomly selects a transformation from a number of available file transformations each arranged to alter the bit pattern of a file to which it is applied while still enabling manifestation of at least some of the file'"'"'s semantic content to a user. The selected transformation is then applied to the data file to produce a transformed file. Preferably, the transformation engine runs in a dedicated virtual machine of a computing platform.
-
Citations
22 Claims
-
1. A method of nullifying malicious code potentially contained within a data file received by a computing platform, the method comprising:
-
selecting, at random, a transformation to be applied to the received data file from at least two available transformations, each transformation being such as to alter the bit pattern of a file to which it is applied while still enabling manifestation of at least some of the file'"'"'s semantic content to a user, and applying the selected transformation to the received data file to generate a transformed file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A transformation engine for nullifying malicious code potentially contained within a data file, the transformation engine comprising:
-
a library of available transformations each arranged to alter the bit pattern of a file to which it is applied while still enabling manifestation of at least some of the file'"'"'s semantic content to a user; a selection arrangement for selecting, at random, a transformation to be applied to the data file from said available transformations; and an arrangement for applying the selected transformation to the data file to generate a transformed file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification