METHODS AND APPARATUS FOR APPLICATION ISOLATION
First Claim
1. An apparatus, comprising:
- a memory; and
a hardware processor communicatively coupled to the memory, the hardware processor configured to execute a virtual machine monitor at least partially stored in the memory, the virtual machine monitor configured to provide a first level of virtualization,the hardware processor configured to execute a virtual environment using the virtual machine monitor, the virtual environment configured to provide a second level of virtualization, the second level of virtualization operating within the first level of virtualization,the hardware processor configured to execute the application within the virtual environment, access to data associated with a host operating system by the application being restricted to a shared memory configured to operate within the first level of virtualization,the hardware processor configured to monitor behavior of the application within the virtual environment, the hardware processor configured to discard the virtual environment in response to detecting unauthorized activity of the application.
3 Assignments
0 Petitions
Accused Products
Abstract
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OSVM. A detection module operates under the guest OSVM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.
-
Citations
20 Claims
-
1. An apparatus, comprising:
-
a memory; and a hardware processor communicatively coupled to the memory, the hardware processor configured to execute a virtual machine monitor at least partially stored in the memory, the virtual machine monitor configured to provide a first level of virtualization, the hardware processor configured to execute a virtual environment using the virtual machine monitor, the virtual environment configured to provide a second level of virtualization, the second level of virtualization operating within the first level of virtualization, the hardware processor configured to execute the application within the virtual environment, access to data associated with a host operating system by the application being restricted to a shared memory configured to operate within the first level of virtualization, the hardware processor configured to monitor behavior of the application within the virtual environment, the hardware processor configured to discard the virtual environment in response to detecting unauthorized activity of the application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
initiate a virtual container to execute an application, the virtual container providing a first level of virtualization executed within a second level of virtualization, the application being isolated from a host operating system by the first level of virtualization and the second level of virtualization, access to data associated with the host operating system by the virtual container is restricted to a data store configured to operate within the second level of virtualization; monitor behavior of the application within the virtual container; detect, based on the monitoring, an unauthorized activity of the application; and discard the virtual container in response to detecting the unauthorized activity. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus, comprising:
-
a memory; and a hardware processor communicatively coupled to the memory, the hardware processor configured to execute; a virtual machine to define a first level of virtualization, a virtual container within the virtual machine to define a second level of virtualization within the first level of virtualization, and an application within the virtual container, a shared memory configured to operate within the first level of virtualization, access to data associated with a host operating system by the application is restricted to the shared memory, the hardware processor is configured to monitor behavior of the application within the virtual container, the hardware processor configured to discard the virtual container in response to detecting unauthorized activity of the application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification