×

Feedback-driven malware detector

  • US 7,730,040 B2
  • Filed: 07/27/2005
  • Issued: 06/01/2010
  • Est. Priority Date: 07/27/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method to determine whether an application program contains malware, comprising:

  • employing a processor executing computer executable instructions stored on a computer readable storage medium to implement the following acts;

    monitoring an extensibility point that allows the application program to execute without input from a user, the user being a participant in a malware prevention service that is configured to receive input from a plurality of different malware prevention service participants;

    determining whether the application program is scheduled to be installed and added to the extensibility point;

    informing the user that the application program is scheduled to be installed and added to the extensibility point;

    sending one or more portions of information regarding the application program that is scheduled to be installed and added to the extensibility point to a remote computer, wherein the remote computer is a trusted entity that is trusted by the user, the remote computer being configured to aggregate application program data from each of the plurality of malware prevention service participants;

    receiving from a remote computer aggregated application program information indicating the number of other malware prevention service participants who previously allowed and declined the application to be installed;

    displaying to the user the number of malware prevention service participants that allowed installation of the application program and the number of malware prevention service participants that declined installation of the application program;

    obtaining decision input from the user regarding whether the application program should be installed, where the user'"'"'s decision is based upon the received aggregated application information indicating whether other malware prevention service participants allowed or declined installation of the application program; and

    transmitting a set of data that includes the input obtained from the user to a remote computer, wherein the set of data includes;

    a signature of an object that is scheduled to be executed when the application program is added to the extensibility point;

    metadata that describes attributes of the object; and

    run-time attributes that identify the state of the computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×