Systems and methods of analyzing a software component
First Claim
Patent Images
1. A method comprising:
- receiving, at a computing device, a request to analyze a software component, wherein the request indicates a target operating system, wherein the target opera system is a custom operating system derived from an image from a golden master source;
generating a virtual machine at the computing device, wherein the virtual machine implements the target operating system;
executing the software component in the target operating system on the virtual machine; and
generating data indicating effects of executing the software component on the virtual machine, wherein the data identifies at least one of a function call, a memory modification, a file access, a network access, a registry modification, a file system modification, or a system resource utilization.
1 Assignment
0 Petitions
Accused Products
Abstract
A particular method includes receiving, at a device, a request to analyze a software component. The request indicates a target operating system. The method also includes generating a virtual machine at a computing device. The virtual machine implements the target operating system. The method further includes executing the software component in the target operating system on the virtual machine and generating data indicating effects of executing the software component on the virtual machine.
101 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computing device, a request to analyze a software component, wherein the request indicates a target operating system, wherein the target opera system is a custom operating system derived from an image from a golden master source; generating a virtual machine at the computing device, wherein the virtual machine implements the target operating system; executing the software component in the target operating system on the virtual machine; and generating data indicating effects of executing the software component on the virtual machine, wherein the data identifies at least one of a function call, a memory modification, a file access, a network access, a registry modification, a file system modification, or a system resource utilization. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a memory storing instructions that, when executed by the processor, cause the processor to perform operations comprising; receiving a request to analyze a first software component, wherein the request indicates a target operating system, wherein the target operating system is a custom operating system derived from an image from a golden master source; generating a virtual machine, wherein the virtual machine implements the target operating system; executing the first software component in the target operating system on the virtual machine; and generating first data associated with execution of the first software component on the virtual machine, wherein the first data identifies at least one of a function call, a memory modification, a file access, a network access, a registry modification, a file system modification, or a system resource utilization. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage device storing instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a request to analyze a software component, wherein the request indicates a target operating system, wherein the target operating system is a custom operating system derived from an image from a golden master source; generating a virtual machine at a computing device, wherein the virtual machine implements the target operating system; executing the software component in the target operating system on the virtual machine; and generating first data associated with execution of the software component on the virtual machine, wherein the first data identifies at least one of a function call, a memory modification, a file access, a network access, a registry modification, a file system modification, or a system resource utilization. - View Dependent Claims (19, 20)
-
Specification