×

Systems and methods for detecting malware-induced crashes

  • US 9,665,715 B1
  • Filed: 12/23/2013
  • Issued: 05/30/2017
  • Est. Priority Date: 12/23/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting malware-induced crashes, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, by analyzing a health log associated with a previously stable computing device, an occurrence of an unexpected stability problem on the previously stable computing device, wherein the health log tracks at least one of;

    the overall stability of the previously stable computing device over time;

    the stability, over time, of application software installed on the previously stable computing device; and

    the stability, over time, of system software installed on the previously stable computing device;

    identifying, by analyzing an event log associated with the previously stable computing device, an event that is potentially responsible for the occurrence of the unexpected stability problem on the previously stable computing device;

    identifying a community of computing devices operating within at least one of a particular enterprise and a particular industry, the community of computing devices comprising the previously stable computing device;

    determining that the event is potentially malicious based at least on;

    the event being potentially responsible for the occurrence of the unexpected stability problem on the previously stable computing device;

    a determination that other computing devices within the community of computing devices have also experienced the unexpected stability problem;

    a determination that computing devices outside of the community of computing devices have not experienced the unexpected stability problem; and

    a determination that the event is potentially part of an advanced persistent threat targeted at the community of computing devices; and

    performing a security action in response to determining that the event is potentially malicious that improves at least one of the security, performance, and stability of at least one of the previously stable computing device and one or more additional computing devices.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×