×

Malicious content analysis using simulated user interaction without user involvement

  • US 9,104,867 B1
  • Filed: 03/13/2013
  • Issued: 08/11/2015
  • Est. Priority Date: 03/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting malicious content, the method comprising:

  • monitoring, by a monitoring module executed by a processor, activities behaviors of a malicious content suspect executed within a sandboxed operating environment;

    detecting, while monitoring, an event triggered by the malicious content suspect to display a graphical user interface (GUI) operating as a dialog box that prompts for user interaction;

    in response to detecting the event to display the GUI triggered by the malicious content suspect, simulating, by a user interaction module executed by the processor, the user interaction with the GUI without user intervention; and

    analyzing, by an analysis module executed by the processor, behaviors of the malicious content suspect in response to the simulated user interaction to determine whether the malicious content suspect should be declared as malicious,wherein simulating the user interaction comprises automatically, without user intervention, sending a response representing an activation of a predetermined button of the dialog box for receipt by the malicious content suspect.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×