×

Systems and methods for securing computing devices against imposter processes

  • US 9,489,513 B1
  • Filed: 06/25/2013
  • Issued: 11/08/2016
  • Est. Priority Date: 06/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for securing computing devices against imposter processes, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, by the computing device, a process executing on the computing device that is subject to a security assessment;

    determining, by the computing device initiating a query, based on comparing an attribute of the process to an attribute of a legitimate process, that a similarity between the process and the legitimate process meets a predetermined match threshold based at least in part on a similarity of a name of the process with a name of the legitimate process;

    identifying the legitimate process in response to determining that the similarity between the process and the legitimate process meets the predetermined match threshold;

    determining, by the computing device, in response to identifying the legitimate process, that the process is not the legitimate process at least in part by determining that at least one of;

    the process does not comprise a digital signature that matches a digital signature of the legitimate process; and

    a hash of the process does not match a hash of the legitimate process;

    determining, based at least in part on the similarity between the process and the legitimate process meeting the predetermined match threshold and at least in part on determining that the process is not the legitimate process, that the process comprises an imposter process of the legitimate process;

    determining, by the computing device, that a file has been created on the computing device by the imposter process;

    determining, by the computing device, a security action for the file on the computing device in response to determining that the file has been created by the imposter process;

    performing, by the computing device, the security action on the computing device for the file in response to determining the security action and thereby improving security on the computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×