×

Virus detection by executing e-mail code in a virtual machine

  • US 7,607,171 B1
  • Filed: 11/18/2002
  • Issued: 10/20/2009
  • Est. Priority Date: 01/17/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting that executable code associated with an e-mail is harmful, the method comprising:

  • an act of receiving an e-mail that designates at least a first and a second destination computing system;

    an act of detecting that the e-mail has associated executable code;

    an act of determining an environment of the at least the first and the second destination computing system;

    an act of emulating the environment of the at least the first and the second destination computing system to create a first emulated environment corresponding to the first destination computing system and a second emulated environment corresponding to the second destination computing system;

    an act of executing the associated executable code in the first emulated environment and in the second emulated environment;

    an act of determining whether the email is harmful and includes one or more unknown viruses by monitoring the act of executing the associated executable code in the first emulated environment and in the second emulated environment using a plurality of filters for any of one or more viral like actions;

    during execution of the executable code, strategically monitoring an impact of the executable code on the hardware and software of the first emulated environment and the second emulated environment, as well as monitoring for a viral like request to transmit data over a network during execution of the executable code using the plurality of filters;

    if the email is determined to include the viral like request to transmit data over the network, updating the plurality of filters to identify the one or more viral like actions in the email; and

    if the email is determined not to be harmful, an act of delivering the e-mail with the associated executable code to the first destination computing system or the second destination computing system.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×