METHODS, SYSTEMS, AND MEDIA FOR DETECTING COVERT MALWARE
First Claim
Patent Images
1. A method for detecting covert malware in a computing environment, the method comprising:
- generating simulated user activity outside of the computing environment;
conveying the simulated user activity to an application inside the computing environment; and
determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and media for detecting covert malware are provided. In accordance with some embodiments, a method for detecting covert malware in a computing environment is provided, the method comprising: generating simulated user activity outside of the computing environment; conveying the simulated user activity to an application inside the computing environment; and determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity.
482 Citations
33 Claims
-
1. A method for detecting covert malware in a computing environment, the method comprising:
-
generating simulated user activity outside of the computing environment; conveying the simulated user activity to an application inside the computing environment; and determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for detecting covert malware in a computing environment, the system comprising:
a processor that; generates simulated user activity outside of the computing environment; conveys the simulated user activity to an application inside the computing environment; and determines whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
33. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for detecting covert malware in a computing environment, the method comprising:
-
generating simulated user activity outside of the computing environment; conveying the simulated user activity to an application inside the computing environment; and determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity.
-
Specification