Malicious mobile code runtime monitoring system and methods
DC CAFCFirst Claim
1. A processor-based method, comprising:
- receiving downloadable-information;
determining whether the downloadable-information includes executable code; and
causing mobile protection code to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code,wherein the determining comprises performing one or more analyses of the downloadable-information, the analyses producing detection-indicators indicating whether a correspondence is detected between a downloadable-information characteristic and at least one respective executable code characteristic, and evaluating the detection-indicators to determine whether the downloadable-information includes executable code.
6 Assignments
Litigations
1 Petition

Reexamination
Accused Products

Abstract
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
387 Citations
35 Claims
-
1. A processor-based method, comprising:
-
receiving downloadable-information; determining whether the downloadable-information includes executable code; and causing mobile protection code to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code, wherein the determining comprises performing one or more analyses of the downloadable-information, the analyses producing detection-indicators indicating whether a correspondence is detected between a downloadable-information characteristic and at least one respective executable code characteristic, and evaluating the detection-indicators to determine whether the downloadable-information includes executable code. - View Dependent Claims (2, 3)
-
-
4. A processor-based method, comprising:
-
receiving downloadable-information; determining whether the downloadable-information includes executable code; and causing mobile protection code to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code, wherein the causing mobile protection code to be communicated comprises forming a sandboxed package including the mobile protection code and the downloadable-information, and causing the sandboxed package to be communicated to the at least one information-destination. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A processor-based system, comprising:
-
an information monitor for receiving downloadable-information; a content inspection engine communicatively coupled to the information monitor for determining whether the downloadable-information includes executable code; and a packaging engine communicatively coupled to the content inspection engine for causing mobile protection code (“
MPC”
) to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code,wherein the content inspection engine comprises one or more downloadable-information analyzers for analyzing the downloadable-information, each analyzer producing therefrom a detection indicator indicating whether a downloadable-information characteristic corresponds with an executable code characteristic, and an inspection controller communicatively coupled to the analyzers for determining whether the indicators indicate that the downloadable-information includes executable code. - View Dependent Claims (10, 11)
-
-
12. A processor-based system, comprising:
-
an information monitor for receiving downloadable-information; a content inspection engine communicatively coupled to the information monitor for determining whether the downloadable-information includes executable code; and a packaging engine communicatively coupled to the content inspection engine for causing mobile protection code (“
MPC”
) to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code,wherein the packaging engine comprises an MPC generator for providing the MPC, a linking engine coupled to the MPC generator for forming a sandbox package including the MPC and the downloadable-information, and a transfer engine for causing the sandbox package to be communicated to the at least one information-destination. - View Dependent Claims (13, 14, 15)
-
-
16. A processor-based method, comprising:
-
receiving, at an information re-communicator, downloadable-information, including executable code; and causing mobile protection code to be executed by a mobile code executor at a downloadable-information destination such that one or more operations of the executable code at the destination, if attempted, will be processed by the mobile protection code, wherein the causing is accomplished by forming a sandboxed package including the mobile protection code and the downloadable-information, and causing the sandboxed package to be delivered to the downloadable-information destination. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A processor-based system, comprising:
-
receiving means for receiving, at an information re-communicator, downloadable-information, including executable code; and mobile code means communicatively coupled to the receiving means for causing mobile protection code to be executed by a mobile code executor at a downloadable-information destination such that one or more operations of the executable code at the destination, if attempted, will be processed by the mobile protection code, wherein the causing is accomplished by forming a sandboxed package including the mobile protection code and the downloadable-information, and causing the sandboxed package to be delivered to the downloadable-information destination. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification