Mitigating malware
First Claim
Patent Images
1. A system for remediating a suspicious element, comprising:
- a computer processor;
a detection engine executing on the computer processor and configured to;
emulate presentation of a web page;
identify the suspicious element based on emulating presentation of the web page; and
identify a portion of the web page comprising the suspicious element; and
a quarantine engine configured to;
generate a first quarantine instruction identifying the portion of the web page; and
transmit the first quarantine instruction to a server hosting the web page, the server quarantining at least the portion of the web page in response to receiving the first quarantine instruction, and the server serving a remainder of the web page after quarantining the portion of the web page.
4 Assignments
0 Petitions
Accused Products
Abstract
Remediating a suspicious element in a web page is disclosed. An indication of a suspicious element is received. A quarantine instruction is sent to a server of the web page. One example of a quarantine instruction is an instruction to block the page from being served. Another example of a quarantine instruction in as instruction to block an element of the page from being served.
-
Citations
18 Claims
-
1. A system for remediating a suspicious element, comprising:
-
a computer processor; a detection engine executing on the computer processor and configured to; emulate presentation of a web page; identify the suspicious element based on emulating presentation of the web page; and identify a portion of the web page comprising the suspicious element; and a quarantine engine configured to; generate a first quarantine instruction identifying the portion of the web page; and transmit the first quarantine instruction to a server hosting the web page, the server quarantining at least the portion of the web page in response to receiving the first quarantine instruction, and the server serving a remainder of the web page after quarantining the portion of the web page. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for remediating a suspicious element, comprising:
-
emulating, by a computer processor, presentation of a web page; identifying the suspicious element based on emulating presentation of the web page; identifying a portion of the web page comprising the suspicious element; generating, by the computer processor, a first quarantine instruction identifying the portion of the web page; and transmitting, by the computer processor, the first quarantine instruction to a server hosting the web page, the server quarantining at least the portion of the web page in response to receiving the first quarantine instruction, and the server serving a remainder of the web page after quarantining the portion of the web page. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium comprising a plurality of instructions for remediating a suspicious element, the instructions when executed by a processor causing the processor to:
-
emulate presentation of a web page; identify the suspicious element based on emulating presentation page; identify a portion of the web page comprising the suspicious element; generate a first quarantine instruction identifying the portion of the web page; and transmit the first quarantine instruction to a server hosting the web page, the server quarantining at least the portion of the web page in response to receiving the first quarantine instruction, and the server serving a remainder of the web page after quarantining the portion of the web page. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification