MODIFIED FILE TRACKING ON VIRTUAL MACHINES
First Claim
Patent Images
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
- identifying an altered disk sector;
associating the altered disk sector with data that are operated in a virtual machine; and
causing a malicious code scan to be performed on the data.
9 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for tracking modified files on a virtual machine including the steps of identifying an altered disk sector, associating the altered disk sector with code that is operated in a virtual machine, and causing a malicious code scan to be performed on the code.
183 Citations
20 Claims
-
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
identifying an altered disk sector; associating the altered disk sector with data that are operated in a virtual machine; and causing a malicious code scan to be performed on the data. - View Dependent Claims (2, 3)
-
-
4. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
identifying an altered disk sector; associating the altered disk sector with data that are operated in a virtual machine; and causing a malicious code scan to be performed on an operating system within the virtual machine based at least in part of finding that the data have been corrupted by malicious code. - View Dependent Claims (5, 6)
-
-
7. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
identifying an altered disk sector; associating the altered disk sector with data that are operated in a virtual machine; and causing a malicious code scan to be performed on a plurality of files within the virtual machine based at least in part on a finding that the data have been corrupted by malicious code. - View Dependent Claims (8, 9)
-
-
10. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
identifying an altered disk sector; associating the altered disk sector with code that is operated in a virtual machine; and causing a malicious code scan to be performed on a file generated by the code. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
identifying an altered disk sector; associating the altered disk sector with data that are operated in a virtual machine; causing a code scan to be performed on the data; and in response to identifying that an acceptable change has been made to the data, causing an indication to be made representing the fact that similar changes may be desirable in other virtual machines. - View Dependent Claims (17, 18, 19, 20)
-
Specification