Reversion of system objects affected by a malware
First Claim
Patent Images
1. A computerized method of reverting system data effected by a malware, comprising:
- monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device;
logging in an event log, in run time, said plurality of events;
classifying, in run time, a first process of said plurality of processes as a malware;
identifying a set of events of said first process from said plurality of events using said event log; and
identifying at least one system object of said OS which is hosted in said computing device and affected by said set of events;
matching between a signature of said at least one system object and a plurality of signatures of a plurality of system object templates to identify at least one matching system object template of an OS update version suitable to said at least one system object; and
using said at least one system object template for removing, in response to said classification, an effect of said malware which is caused by said set of events to said at least one system object;
wherein said removing comprises deleting or modifying a registry value added by said first process;
wherein said plurality of events comprises a plurality of write commands.
1 Assignment
0 Petitions
Accused Products
Abstract
A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.
18 Citations
17 Claims
-
1. A computerized method of reverting system data effected by a malware, comprising:
-
monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device; logging in an event log, in run time, said plurality of events; classifying, in run time, a first process of said plurality of processes as a malware; identifying a set of events of said first process from said plurality of events using said event log; and identifying at least one system object of said OS which is hosted in said computing device and affected by said set of events; matching between a signature of said at least one system object and a plurality of signatures of a plurality of system object templates to identify at least one matching system object template of an OS update version suitable to said at least one system object; and using said at least one system object template for removing, in response to said classification, an effect of said malware which is caused by said set of events to said at least one system object; wherein said removing comprises deleting or modifying a registry value added by said first process; wherein said plurality of events comprises a plurality of write commands. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system of reverting system data effected by a malware, comprising:
-
a memory hosting an event log and a code; a processor coupled to the memory for executing the code, the code comprising; instructions to monitor, in run, a plurality of events of a plurality of processes executed by an installed operating system (OS) running on a computing device and logs said plurality of events in said event log; instructions to classify, in run time, a first process of said plurality of processes as a malware and to identify a set of events of said first process from said plurality of events using said event log; and instructions to identify at least one system object of said OS which is hosted in said computing device and affected by said set of events; instructions to match between a signature of said at least one system object and a plurality of signatures of a plurality of system object templates to identify at least one matching system object template of an OS update version suitable to said at least one system object; and instructions to use, in response to said classification, said at least one system object template for removing an effect of said malware which is caused by said set of events to said at least one system object; wherein said removing comprises deleting or modifying a registry value added by said first process; wherein said plurality of events comprises a plurality of write commands. - View Dependent Claims (14, 15)
-
-
16. A computerized method of repairing damage caused by malware operations, comprising:
-
monitoring in run time a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device; classifying, in run time, a first process of said plurality of processes as a malware by an analysis of a set of events associated with said first process from said plurality of events; detecting, in run time, an additional event performed by said first process on said computing device; and identifying at least one system object of said OS which is hosted in said computing device and affected by said set of events; matching between a signature of said at least one system object and a plurality of signatures of a plurality of system object templates to identify at least one matching system object template of an OS update version suitable to said at least one system object; and using said at least one system object template for removing an effect of said malware caused by said set of events to said at least one system object; wherein said removing comprises deleting or modifying a registry value added by said first process; wherein said plurality of events comprises a plurality of write commands.
-
-
17. A computer program product for reverting system data effected by a malware, comprising:
-
a non-transitory computer readable storage medium; first program instructions to monitor, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on said computing device; second program instructions to log in an event log, in run time, said plurality of events; third program instructions to classify, in run time, a first process of said plurality of processes as a malware; fourth program instructions to identify a set of events of said first process from said plurality of events using said event log; and fifth program instructions to identifying at least one system object of said OS which is hosted in said computing device and affected by said set of events; sixth program instructions matching between a signature of said at least one system object and a plurality of signatures of a plurality of system object templates to identify at least one matching system object template of an OS update version suitable to said at least one system object; and wherein said removing comprises deleting or modifying a registry value added by said first process; wherein said plurality of events comprises a plurality of write commands; seventh program instructions to use, in response to said classification, said at least one system object template for removing an effect of said malware caused by said set of events to said at least one system object wherein said first, second, third, fourth, fifth, sixth and seventh program instructions are stored on said non-transitory computer readable storage medium.
-
Specification