×

Virus detection by executing electronic message code in a virtual machine

  • US 9,652,613 B1
  • Filed: 04/30/2008
  • Issued: 05/16/2017
  • Est. Priority Date: 01/17/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting whether executable code associated with electronic messages is harmful, the method comprising:

  • detecting that an electronic message includes executable code, the electronic message designating a destination email address;

    identifying, for the electronic message, by executing an instruction with a processor, two or more destination computing systems corresponding to the destination email address specified in the electronic message prior to delivery of the electronic message to the two or more destination computing systems, the two or more destination computing systems including a first destination computing system and a second destination computing system different from the first destination computing system;

    selecting, by executing an instruction with the processor, a first simulation environment among a plurality of simulation environments based on a first environment of the first destination computing system;

    selecting, by executing an instruction with the processor, a second simulation environment among the plurality of simulation environments based on a second environment of the second destination computing system, the second simulation environment different from the first simulation environment;

    executing the executable code in the first simulation environment and the second simulation environment;

    determining, by executing an instruction with the processor, whether the executable code is harmful in at least one of the two or more destination computing systems by monitoring for a viral action in response to execution of the executable code in the first simulation environment and the second simulation environment; and

    delivering the electronic message to the destination email address if the executable code is not harmful in the at least one of the two or more destination computing systems.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×