×

Preventing propagation of malicious software during execution in a virtual machine

  • US 8,402,529 B1
  • Filed: 05/30/2008
  • Issued: 03/19/2013
  • Est. Priority Date: 05/30/2007
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for preventing propagation of malicious content specifying a destination computing device during simulation of execution of content, comprising:

  • a plurality of virtual machines for executing the content in a simulation environment simulating an environment associated with the destination computing device;

    a simulation manager for receiving the content and associating a destination virtual machine from the plurality of virtual machines with the content;

    a virtual firewall adapted to communicate with the simulation manager and the plurality of virtual machines, the virtual firewall establishing a connection to a network, communicating the content to the destination virtual machine and applying one or more access rules to identify a network access command that includes a type of a network action received from the destination virtual machine during execution of the content, wherein the one or more access rules modify the connection to the network, the virtual firewall also preventing the network access command from propagating to a second virtual machine, and wherein the one or more access rules comprise responsive to determining the network access command is non-malicious, determining to allow the network access command to access the connection to the network;

    responsive to determining the network access command is malicious, terminating the connection to the network before the network access command transmits data using the connection to the network; and

    responsive to failing to determine whether the network access command is malicious or non-malicious, determining to allow the network access command to access the connection to the network, monitoring data including one or more data types transmitted by the network access command via the connection to the network, and responsive to detecting transmission of the one or more data types via the connection to the network, terminating the connection to the network, wherein the one or more data types include one or more of configuration data, user data, and registry data.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×